Week 4 Flashcards
(11 cards)
Who are private military companies
they are business organizations that trade in professional services intricately linked to warfare
When (private military companies)
- The British East India Company maintained its own private army to protect
commercial interests in India - Modern: the end of the cold war
Why (private military companies)
- Transformations in the nature of warfare itself
- Privatization revolution
- The incidence of civil wars
- globalization
Where (private military companies)
Advanced liberal societies
Changing attitude
- Changing attitudes towards crime and punishment
- Increasingly centered on prevention and prediction
Security privatization threat to power?
A threat to the power and authority of states. However some argue Security Privatization Is Not a Sign of State Failure Contrary to popular belief, the rise of private security is not necessarily evidence of state weakness. It represents a reconfiguration of the state, where security provision is distributed across public and private actors within complex governance networks.
New view on security
As a market commodity, and not the sole responsibility of governments
Controversial solution to peace and stability operations + what proponents suggests how it might play a constructive role
using private contractors in peace operations
- First, capacity to provide effective troops to UN operations.
- The second way a rapid reaction combat force
Main concerns security privatization
- privatization of combat capacity is not a panacea
- Accountability is the primary concern
- the absence of the rule of law
- the profit motive being primary
- Destructive and illegal behavior by company employee
PSC’s
- PSCs is the ability to fill quickly urgent operational requirements
- the superior cost-efficiency and effectiveness of PSC
- The current lack of transparency, accountability and control of PSCs deployed
in many multilateral interventions may be viewed by some governments as an
advantage/disadvantages
Cyber security
Both about the insecurity created through cyberspace and about the technical and nontechnical practices of making it more secure