Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.
Assessing the legal and practical questions posed by the use of artificial intelligence in national security matters.The increasing use of artificial intelligence poses challenges and opportunities for nearly all aspects of society, including the military and other elements of the national security establishment. This book addresses how national security law can and should be applied to artificial intelligence, which enables a wide range of decisions and actions not contemplated by current law. James Baker, an expert in national security law and process, adopts a realistic approach in assessing how the law-even when not directly addressing artificial intelligence-can be used, or even misused, to regulate this new technology. His new book covers, among other topics, national security process, constitutional law, the law of armed conflict, arms control, and academic and corporate ethics. With his own background as a judge, he examines potential points of contention and litigation in an area where the law is still evolving and might not yet provide clear and certain answers. The Centaur's Dilemma also analyzes potential risks associated with the use of artificial intelligence in the realm of national security-including the challenges of machine-human interface, operating (or not operating) the national-security decision-making process at machine speed, and the perils of a technology arms race. Written in plain English, The Centaur's Dilemma will help guide policymakers, lawyers, and technology experts as they deal with the many legal questions that will arise when using artificial intelligence to plan and carry out the actions required for the nation's defense.
The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.
Security studies, also known as international security studies, is an academic subfield within the wider discipline of international relations that examines organized violence, military conflict, and national security. Meant to serve as an introduction to the field of security studies, Contextualizing Security is a collection of original essays, primary source lectures, and previously published material in the overlapping fields of security studies, political science, sociology, journalism, and philosophy. It offers both graduate and undergraduate students a grasp on both foundational issues and more contemporary debates in security studies. Nineteen chapters cover security studies in the context of homeland security and liberty, U.S. foreign policy, lessons from the Cold War, science and technology policy, drones, cybersecurity, the War on Terror, migration, study-abroad programs, the surveillance state, Africa, and China. CONTRIBUTORS: Amelia Ayers, James E. Baker, Roy D. Blunt, Mark Boulton, Naji Bsisu, Robert E. Burnett, Daniel Egbe, Laila Farooq, Lisa Fein, Anna Holyan, Jeh C. Johnson, Richard Ledgett, David L. McDermott, James McRae, Amanda Murdie, Bernie Sanders, Jeremy Scahill, Kristan Stoddart, Jeremy Brooke Straughn, J. R. Swanegan, and Kali Wright-Smith
Security studies, also known as international security studies, is an academic subfield within the wider discipline of international relations that examines organized violence, military conflict, and national security. Meant to serve as an introduction to the field of security studies, Contextualizing Security is a collection of original essays, primary source lectures, and previously published material in the overlapping fields of security studies, political science, sociology, journalism, and philosophy. It offers both graduate and undergraduate students a grasp on both foundational issues and more contemporary debates in security studies. Nineteen chapters cover security studies in the context of homeland security and liberty, U.S. foreign policy, lessons from the Cold War, science and technology policy, drones, cybersecurity, the War on Terror, migration, study-abroad programs, the surveillance state, Africa, and China. CONTRIBUTORS: Amelia Ayers, James E. Baker, Roy D. Blunt, Mark Boulton, Naji Bsisu, Robert E. Burnett, Daniel Egbe, Laila Farooq, Lisa Fein, Anna Holyan, Jeh C. Johnson, Richard Ledgett, David L. McDermott, James McRae, Amanda Murdie, Bernie Sanders, Jeremy Scahill, Kristan Stoddart, Jeremy Brooke Straughn, J. R. Swanegan, and Kali Wright-Smith
Covert activity has always been a significant element of international politics. When it has served their interests, governments have secretly disseminated propaganda in other countries, manipulated foreign economies, and abetted coups against their adversaries. What are the circumstances, if any, in which it is lawful, under international law or United States law, to resort to covert action either directly or through local proxies? When is it right to do so?  This book is the first to assess the lawfulness of covert action under United States and international law and to face candidly the implications for democratic states that covert operations pose. Michael Reisman and James E. Baker identify different types of covert actions, discussing a variety of cases that include the Trujillo assassination in 1961, the Rainbow Warrior in 1985, and the raid on Libya in 1986. After explaining the complex operations of the international legal system, they explore trends in decision making and the conditions that accounted for them—whether the covert operations were proactive, defensive, or reactive. They examine in detail the procedures followed in the United States to authorize and oversee covert activity and propose guidelines for political leaders who may contemplate using covert techniques. An appendix reviews twenty years of allegations of covert aggression brought to the attention of the United Nations Security Council.
|
You may like...
Mission Impossible 6: Fallout
Tom Cruise, Henry Cavill, …
Blu-ray disc
(1)
|