has grown steadily since. The private military companies are extremely attractive to former military. Private military companies, security contractors and private military firms do provide so very useful functions and not all of them are paramilitary. Many private military companies such as DynCorp and Kellogg, Brown & Root (KBR), a subsidiary of Halliburton, provide more services than just protection. Many functions performed by private military companies include logistical support, transportation, engineering, construction, skilled and unskilled laborers, maintenance, technical expertise and other paramilitary operations. (Kidwell, 2005) The government typically hires private security contractors to provide services that formally belonged to military forces such as the protection of high profile dignitaries and the guarding of military installations overseas. The proliferation of private military companies jumped significantly after the events of 9/11. The Bush Administration enacted a three-phase plan to increase the number of private contractors hired. The first phase in the hiring process was to try to release the military to fight the war on terrorism; the second phase was to allow commanders to focus their efforts on winning the war by outsourcing supplementary functions; third, it would support the President’s Management Agenda. As a result, private military companies are a necessary and important contingency plan for operations that would occur in Iraq and Afghanistan. (Dogru, p.13, 2010) Contracting private military companies and private security contractors are not without their issues. Management of these companies and contractors are a crucial issue for the government. One of the most significant challenges in d... ... middle of paper ... ...l/?ots783=0c54e3b3-1e9c-be1e-2c24- a6a8c7060233&lng=en&id=14077 Unknown. (n.d.). International code of conduct for private security service providers. Retrieved from http://www.icoc-psp.org/About_ICoC.html Avant, D. & Sigelman, L. (2010, May 28). Private security and democracy: Lessons from the us in iraq.Security Studies, 19(2), 230-265. Retrieved from http://psm.du.edu/media/documents/related_resources/01_avant_sigelman_private_securi ty_and_democracy.pdf Schooner, S. (2005, June). []. What are some advantages and disadvantages of hiring private contractors?., Retrieved from http://www.pbs.org/wgbh/pages/frontline/shows/warriors/faqs/ Elsea, J. K. Congressional Research Service , (2010).Private security contractors in iraq and afghanistan: Legal issues . Retrieved from Congressional Research Service website: http://www.fas.org/sgp/crs/natsec/R40991.pdf
McCraw, David, and Stephen Gikow. “The End to a Unspoken Bargain? National Security and Leaks in a Post-Pentagon Papers World.” Harvard Civil Rights-Civil Liberties Law Review 48.2 (2013): 473-509. Academic OneFile. Web. 5 Dec. 2013.
Cole, D., & Dempsey, J. X. (2006). Terrorism and the constitution: sacrificing civil liberties in the name of national security. New York: New Press.
At the July Association of the United States Army (AUSA) Conference, LTG Ostrowski, the Army Acquisition Executive Lead, conveyed the Army’s need for future network solutions. It was also shared in the FY16 Presidential Budget that the Army has several budget requests for Communications systems and upgrades totally over $1.2B (Keller, J. , 2015). This is an opportunity for the Comms BU to expand its customer base in the U.S. Army market place. Northrop Grumman was ranked in the Top 5 of Aerospace and Defense Companies in Forbes America’s Best Employers list (2017). They were ranked over larger companies such as Boeing, Lockheed Martin and Raytheon. Their commitment to their employees, diversity, their customer and even the environment drives their culture. Northrop Grumman’s competitive advantage is leveraging the technology already developed and tested for the services (Air Force and Navy). Their experience with the Army is via services work where our people have gained the expertise to be the right people for working with the Missile Defense Agency. After analyzing both the internal and external environment of Northrop, their competitors and the analysis of their financial position, Northrop has developed a sustainable competitive advantage. They have done this through the use of product differentiation. The value they receive, the knowledge they gain and patents they own by acquiring other companies expands their portfolio to offer products and services not comparable to their competitors. Their respective strategic position establishes a value to their customers that is differentiated amongst their competitors, allowing them to offer a higher premium for their products and
Taylor, James Stacey. "In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance." Public Affairs Quarterly July 2005: 227-246.
The general topic for this literature review will be an examination of the Department of Defense and the National Guard in terms of Homeland Security. The areas of Homeland Defense and Civil Support will be primary subsections of Homeland Security which will be reviewed. For purposes of defining a time period none of the literature reviewed will be prior to September 11, 2001. The reasoning for this being to examine Homeland Defense using literature pertaining to 9/11 and the Boston Marathon Bombing, and Civil Support using literature pertaining to Hurricane Katrina.
Hudson, William E. American Democracy in Peril: Eight Challenges to America's Future. Washington, DC: CQ, 2010. Print.
Historically, citizens of many countries sacrifice their personal liberties for a sense of security masked as a governmental attempt for pushing their views onto the citizens. A historical example of this scenario is the passing and enforcement of the Es...
Richards, Neil M. "The Dangers Of Surveillance." Harvard Law Review 126.7 (2013): 1934-1965. Academic Search Elite. Web. 8 Feb. 2014.
Hudson, William E. American Democracy in Peril: Eight Challenges to America’s Future – Fourth Edition. Washington, D.C.: CQ Press, 2004.
...es has done a great service in bringing these previously published essays together. All are stimulating; many are truly excellent. Yet I wonder: Where is the private in this analysis? What are its distinctive functions, comforts, and benefits? Are some of the authors too sanguine about our ability to protect our private lives? What might be the dangers of legitimating an embodied and particular political presence (and multiple, raucous publics)? As I [End Page 181] conclude this review, President Clinton has been impeached for a private act made public, and the most public act of all, the bombing of another country, has raised little debate. These events should force us to confront anew our conceptualizations of the public and the private--as well as our presence and role in public life. The discussion, to which this volume makes a significant contribution, continues.
Information Security (INFOSEC) consultants help client companies through strategic partnerships (Ghodeswar & Vaidyanathan, 2008). A short review of United States outsourcing creates a prospective baseline for outsourcing endeavors of private institutions (Ghodeswar & Vaidyanathan, 2008). Despite the fact that the vendor has accountability and duties (detailed in the statement of work), the client is predominantly in charge of supervising strategic partnerships (Ghodeswar & Vaidyanathan, 2008).
Sempa, Francis P. "Privacy, Technology and National Security." American Diplomacy (2013). Opposing Viewpoints in Context. Web. 18 Feb. 2014.
Boykoff, J. (2006). Review of How Patriotic is the Patriot Act? Freedom Versus Security in the Age of Terrorism, by Amitai Etzioni. The Journal of Politics, 68(2), 457-487.
Citizens feeling protected in their own nation is a crucial factor for the development and advancement of that nation. The United States’ government has been able to provide this service for a small tax and for the most part it is money well spent. Due to events leading up to the terrifying attacks on September 11, 2001 and following these attacks, the Unites States’ government has begun enacting certain laws and regulations that ensure the safety of its citizens. From the Foreign Intelligence Surveillance Act (FISA) of 1978 to the most recent National Security Agency scandal, the government has attempted and for the most part succeeded in keeping domestic safety under control. Making sure that the balance between obtaining enough intelligence to protect the safety of the nation and the preservation of basic human rights is not extremely skewed, Congress has set forth requisites in FISA which aim to balance the conflicting goals of privacy and security; but the timeline preceding this act has been anything but honorable for the United States government.
Primarily, the publics’ perceptions that private security agencies and its employees have no legal authority, therefore, tends to disrespect them or not adhered to the directives or comply to the enforcement they intend to implement. The main goal of most private security agencies and guards are the same, protecting life and property, however this is an unyielding task for those in this profession. Another great challenge for private security lies in the supplies and demands of the community in which they serve. Economic environments tend to determine how successful private security can be. Most private security agencies rely on the demands of the company, the level of security they require, the length of the contract or assignment, and lastly, the budget in which the company has allowed for these services.