You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
National Security Law and the Constitution provides a comprehensive examination and analysis of the inherent tension between the Constitution and select national security policies, and it explores the multiple dimensions of that conflict. Specifically, the Second Edition comprehensively explores the constitutional foundation for the development of national security policy and the exercise of a wide array of national security powers. Each chapter focuses on critically important precedents, offering targeted questions following each case to assist students in identifying key concepts to draw from the primary sources. Offering students a comprehensive yet focused treatment of key national secur...
This book examines the normative debates around the American use of targeted killings. It questions whether the Obama administration’s defence of its use of targeted killings is cohesive or hypocritical. In doing so, the book departs from the disciplinary purpose of international law, constitutional law and the just war tradition and instead examines discipline-specific defences of targeted killings to identify their requisite normative principles in order to compare these norms across disciplines. The methodology used in this book means that it argues that targeted killings are only defensible as acts of war, but it also highlights the normative role of accountability and responsibility i...
How security procedures could be positive, safe, and effective The inspections we put up with at airport gates and the endless warnings we get at train stations, on buses, and all the rest are the way we encounter the vast apparatus of U.S. security. Like the wars fought in its name, these measures are supposed to make us safer in a post-9/11 world. But do they? Against Security explains how these regimes of command-and-control not only annoy and intimidate but are counterproductive. Sociologist Harvey Molotch takes us through the sites, the gizmos, and the politics to urge greater trust in basic citizen capacities—along with smarter design of public spaces. In a new preface, he discusses abatement of panic and what the NSA leaks reveal about the real holes in our security.
The first book dedicated to the sociology of privatized security, this collection studies the important global trend of shifting security from public to private hands and the associated rise of Private Military and Security Companies (PMSCs) and their contractors. The volume first explores the trend itself, making important historical and theoretical revisions to the existing social science of private security. These chapters discuss why rulers buy, rent and create private militaries, why mercenaries have become private patriots, and why the legitimacy of military missions is undermined by the use of contractors. The next section challenges the idea that states have a monopoly on legitimate ...
Shades of Deviance is a turbo-driven guide to crime and deviance. It offers politically engaged, thought-provoking and accessibly written accounts of a wide range of socially and legally prohibited acts. This updated and revised edition is designed to be essential reading for general readers, undergraduate students in the fields of criminology and sociology, and those preparing to embark on degree courses in these fields. Written by field-leading experts from across the globe and designed for those who want a clear and exciting introduction to the complex areas of crime and deviance, this book provides short overviews of a wide range of social problems, harms and criminal acts, offering a se...
This book investigates the strategic use of America’s historical crime control, counterterrorism, national security and immigration policies as a mechanism in the modern-day Trump administration to restrict migration and refugee settlement with a view of promoting national security and preservation. National Security and Policy in America critically explores how American culture, neocolonial aspirations, and indifference towards others negatively impact long-term global security. This book examines immigration and security policies and their origins, purpose, impact, and evolution vis-à-vis the recently imposed ‘travel ban’ and proposed border wall across the Southern border, as well ...
This book presents groundbreaking discussions on e-residency, cryptocurrencies, scams, smart contracts, 3D printing, software agents, digital evidence and e-governance at the intersection of law, legal policies and modern technologies. The reader benefits from cutting-edge analyses that offer ideas and solutions to some of the most pressing issues caused by e-technologies. This collection is a useful tool for law and IT practitioners and an inspiring source for interdisciplinary research. Besides serving as a practical guideline, this book also reflects theoretical dimensions of future perspectives, as new technologies are not meant to change common values but to accommodate them.
What connects political violence in Classical Athens and state terrorism in the Roman republic to the Easter Sunday attacks in Sri Lanka and the modern destruction of monuments? Using 9/11 as a lens through which to examine past instances of terrorism, this book presents a wide global view of the use of terror and its impact throughout history. Contributors are: Jaime A. González-Ocaña, Aaron L. Beek, Francesco Mori, Gaius Stern, Timothy Smith, João Nisa, Ölbei Tamás, James Crossland, Paul J. Cook, Chris Millington, Vineeth Mathoor, Dmitry Shlapentokh, Kalinga Tudor Silva, Cserkits Michael, Katty Cristina Lima Sá, Tatiana Konrad, Daniel Leach, Paul J. Cook, Mark Briskey, Silke Zoller, Elizabeth L. Miller, and William V. Hudon.
"This volume is a collection of four reports that collectively address these issues by exploring the themes of legitimacy, civilian protection, and national security interests. They address questions in the modern counterterrorism context.This volume provides concrete recommendations for policy makers as well as military commanders, a number of which have, since the time of its writing, been incorporated into the recent U.S. policy guidelines related to civilian casualties. Although this volume focuses specifically on current counterterrorism practices, its analysis, frameworks, and conclusions can be applied in varying degrees to emerging technologies as well. These considerations can help a government ensure that its use of force is not only effective, but also responsible and consonant with its larger interests."--Provided by publisher.
Written by a team of international lawyers from Europe, Asia, Africa, and the Caribbean,this book analyses some of the most significant aspects of the ongoing armed conflictbetween the Russian Federation and Ukraine. As challenging as this conflict is for the international legal order, it also offers lessonsto be learned by the States concerned, and by other States alike. The book analysesthe application of international law in this conflict, and suggests ways for this law’sprogressive development. It will be useful to practitioners of international law working at national Ministriesof Defence, Justice, and Foreign Affairs, as well as in Parliaments, to lawyers ofinternational organization...