Regulation of National Security Contracting
Contract soldiers have been used by nations and states since early history. Ancient kings would contract knights to fight with those loyal to them, warlords made pacts with neighboring states and paid for the services of their soldiers, the Hessians, who fought for the British in the Revolutionary War, were German mercenaries. It is a tradition to hire out the security of a nation when its force is inadequate.
In the second Gulf War and Afghanistan, the United States and private interests have hired security companies to work in combat zones. The duties of these private soldiers include "services such as information technology and equipment maintenance, operational support such as facilities management and logistics, and actual armed 'security' in conflict zones" (Perlo-Freeman & Skons). Unfortunately, the use of these security firms has caused some legal problems, and it is difficult for the U.S. court system to deal with soldiers who are not actually military personnel. It is a fact that national security contracting in the United States is here to stay. The problem is how to reform and regulate this area of national security taking into account national constraints stemming from the jurisdictional tension between the private and the public sectors (U.S. Government).
In 2008, a case was brought before a U.S. district court. The hearing involved members of a private security firm, Blackwater, who had been tasked with providing a secure evacuation route for a group of U.S. officials the previous year while in Baghdad. The route was required because an explosive device had exploded nearby. "Soon after the Raven 23 vehicles entered the traffic circle, a shooting incident erupted, during which the defendants allegedly shot and killed fourteen persons and wounded twenty others" (U.S. v Slough). The security force believed that they had made "a legitimate response to a mortal threat" (U.S. v Slough), but the U.S. government contended that the killed and wounded were civilian casualties. The security force argued that they had been compelled to make personally damaging statements during the subsequent interrogations. The court found that the five members of the team who came under indictment were compelled to give testimony that could have been personally damaging under the threat of termination from Blackwater (U.S. v Slough).
The evidence seemed to be overwhelming that the contracted personnel had fired on civilians, but the case was thrown out by the U.S. district court because of tainted interrogations and witness testimony. The investigators were overly zealous because the situation in Iraq was incredibly tense, and the ill-advised actions of a security team had made the state of affairs even more untenable.
The main question that comes from such a case is if the personnel were guilty of a crime, why were procedures not in place that would have streamlined the investigations and resulted in just convictions? Instead, the original investigators had to be removed and two grand juries had to be convened (U.S. v Slough). Despite these precautions, new evidence was still deemed tainted. Either procedures should have been in place or these civilian forces should not have been utilized.
However, as mentioned in the introduction, the security forces are here to stay. Perlo-Freeman and Skons relate that;
"Two trends led to the creation of the military services industry. The first was the large supply of discharged military personnel after the end of the cold war and the widespread demand for these personnel from both weak states facing internal conflicts and non-state actors operating in conflict zones. The second trend was the increased privatization and outsourcing by the governments in advanced market economies of a wide range of functions that were previously carried out by military forces or defence ministries."
For many years it has been noted that the U.S. military does not have the personnel available to be engaged in conflicts on multiple fronts. But, with current conflicts in Iraq and Afghanistan, and possible future necessity for armed conflict in Iran, North Korea and elsewhere, it is imperative that such companies remain available. "Contracting out areas of work seen as non-core can give militaries a higher 'tooth-to-tail' ratio with more soldiers able to engage in operational activity" (Perlo-Freeman & Skons).
Besides the stated military assistance that these firms provide, they can be used as personal security, in high-risk zones, for private companies. "[T]he use of contracted armed security is…a reality for the international humanitarian community. No major humanitarian provider -- UN, NGO or Red Cross -- can claim that it has never paid for armed security"...
This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:
The purpose of the take-or-pay clause is to allocate the respective risks of the production and sales of natural gas between buyers and sellers. According to Gaille, "The seller bears the risk of production. To compensate seller for that risk, buyer agrees to take, or pay for if not taken, a minimum quantity of gas. The buyer bears the risk of market demand. The take-or-pay clause ensures that if the
International Ship and Port Security (ISPS) Code on Maritime Security The study will be based on the question that "What is the impact of the International Ship and Port Security (ISPS) Code on Maritime Security." Answers will be sought to have this question addressed adequately. The study feels that the ISPS Code has some impacts upon the Maritime Security in the world. Thus, the study seeks to uncover the various impacts
International Ship and Port Security (Isps) Code on Maritime Security Impact of the International Ship and Port Security (ISPS) Code on Maritime Security The study will be based on the question that "What is the impact of the International Ship and Port Security (ISPS) Code on Maritime Security." Answers will be sought to have this question addressed adequately. The study feels that the ISPS Code has some impacts upon the Maritime Security
COUNTERFEIT COSMETICS & HOMELAND SECURITY ISSUES Problem Identification Counterfeit cosmetics are prevalent specifically over the Internet on such websites as Ebay. These cosmetics are dangerous and cause severe problems even death among those who purchase and use these products. The U.S. Department of Homeland Security (DHS) is reported to be conducting an investigation of the major counterfeit cosmetic manufacturing rings that are producing and selling products reported to contain "high concentrations of
Vermont's Junior Senator, Bernard Sanders introduced to the Senate the Stop Outsourcing Security Act S. 2398. The Stop Outsourcing Security Act will help solve the lack of oversight of contractors in Iraq by requiring that by June 2008, "the President shall submit to each specified congressional committee a report on the status of planning for the transition away from the use of private contractors for mission critical or emergency
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now