Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Some have claimed that "War is too important to be left to the generals," but P. W. Singer asks "What about the business executives?" Breaking out of the guns-for-hire mold of traditional mercenaries, corporations now sell skills and services that until recently only state militaries possessed. Their products range from trained commando teams to strategic advice from generals. This new "Privatized Military Industry" encompasses hundreds of companies, thousands of employees, and billions of dollars in revenue. Whether as proxies or suppliers, such firms have participated in wars in Africa, Asia, the Balkans, and Latin America. More recently, they have become a key element in U.S. military operations. Private corporations working for profit now sway the course of national and international conflict, but the consequences have been little explored.In Corporate Warriors, Singer provides the first account of the military services industry and its broader implications. Corporate Warriors includes a description of how the business works, as well as portraits of each of the basic types of companies: military providers that offer troops for tactical operations; military consultants that supply expert advice and training; and military support companies that sell logistics, intelligence, and engineering.This updated edition of Singer's already classic account of the military services industry and its broader implications describes the continuing importance of that industry in the Iraq War. This conflict has amply borne out Singer's argument that the privatization of warfare allows startling new capabilities and efficiencies in the ways that war is carried out. At the same time, however, Singer finds that the introduction of the profit motive onto the battlefield raises troubling questions-for democracy, for ethics, for management, for human rights, and for national security.
Defense industries --- Military-industrial complex --- Privatization --- huurlingenorganisatie --- 35.078 --- 328.182:355 --- -Military-industrial complex --- -35.078 --- 855.2 Private actoren --- Industrial-military complex --- Armaments industries --- Arms sales --- Military sales --- Military supplies industry --- Munitions --- Sale of military equipment --- Vormen van overheidsbemoeing. Opheffing van overheidstussenkomst. Privatisering --- Militairindustrieel complex. Oorlogsindustrie als pressie. Military-industrial complex --- 328.182:355 Militairindustrieel complex. Oorlogsindustrie als pressie. Military-industrial complex --- 35.078 Vormen van overheidsbemoeing. Opheffing van overheidstussenkomst. Privatisering --- Industries --- Arms transfers --- United States --- Military policy. --- Polemology --- Defense industries - United States --- Military-industrial complex - United States --- Privatization - United States --- United States of America --- Defense industries. --- Military-industrial complex. --- Privatization.
Choose an application
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers - presumably sponsored by the Chinese government - is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity is the definitive account on the subject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.
Computer security --- Computer networks --- Cyberspace --- Cyberterrorism --- Information warfare --- Security measures --- Prevention --- Human rights --- Artificial intelligence. Robotics. Simulation. Graphics --- Sociology of culture --- Military art and science --- Space and time --- Computers --- Telematics --- Prevention. --- Computer security - United States --- Computer networks - Security measures - United States --- Cyberspace - Security measures - United States --- Cyberterrorism - United States - Prevention --- Information warfare - United States - Prevention
Choose an application
Choose an application
Choose an application
Social media has been weaponized, as state hackers and rogue terrorists have seized upon Twitter and Facebook to create chaos and destruction.
Listing 1 - 5 of 5 |
Sort by
|