Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
6,260
result(s) for
"security apparatus"
Sort by:
101 spy gadgets for the evil genius
by
Graham, Brad
,
McGowan, Kathy
in
Electronic surveillance Equipment and supplies Design and construction Juvenile literature.
,
Electronic security systems Equipment and supplies Design and construction Juvenile literature.
,
Electronic apparatus and appliances Design and construction Juvenile literature.
2012
\"CREATE FIENDISHLY FUN SPY TOOLS AND COUNTERMEASURESFully updated throughout, this wickedly inventive guide is packed with a wide variety of stealthy sleuthing contraptions you can build yourself. 101 Spy Gadgets for the Evil Genius, Second Edition also shows you how to reclaim your privacy by targeting the very mechanisms that invade your space. Find out how to disable several spy devices by hacking easily available appliances into cool tools of your own, and even turn the tables on the snoopers by using gadgetry to collect information on them.Featuring easy-to-find, inexpensive parts, this hands-on guide helps you build your skills in working with electronics components and tools while you create an impressive arsenal of spy gear and countermeasures. The only limit is your imagination!101 Spy Gadgets for the Evil Genius, Second Edition: Contains step-by-step instructions and helpful illustrations Provides tips for customizing the projects Covers the underlying principles behind the projects Removes the frustration factor--all required parts are listed Build these and other devious devices: Spy camera Infrared light converter Night vision viewer Phone number decoder Phone spammer jammer Telephone voice changer GPS tracking device Laser spy device Remote control hijacker Camera flash taser Portable alarm system Camera trigger hack Repeating camera timer Sound- and motion-activated cameras Camera zoom extender \"-- Provided by publisher.
Security in transition(s)
2019
By drawing on critical security studies in the context of a sociotechnical transition, this article calls for more attention to the presence and sometimes alternative use of mostly unobserved security practices in the materialization of everyday consumer goods and services. This call is illustrated through a discussion of the phenomenon of range anxiety and the intra-action between drivers of electric vehicles (EVs), designers, and algorithms that observe, estimate and nudge the remaining range of an EV. Inspired by Foucault and Barad, the range-anxiety discussion offers four alternative security insights. First, it supports an argument to include stress as an embodied instance of insecurity. Second, it draws attention to a security apparatus that is based on a constantly expanding assemblage around range estimates. Third, it shows how this apparatus rests on a novel algorithm that has a continuous instead of a binary output and is governed by a distributed sovereignty: where the driver simultaneously is the object of measurement, subject of governance for more efficient driving and the ultimate sovereign who decides on the trip. Lastly, the discussion highlights how range estimates not only mediate the materialization of EVs and their automobility but also (re)perform epistemological or ontological forms of uncertainty.
Journal Article
COVID-19, wall building, and the effects on Migrant Protection Protocols by the Trump administration: the spectacle of the worsening human rights disaster on the Mexico-U.S. border
2020
The COVID-19 pandemic has repercussions well beyond the confines of borders. National border policies can thwart international efforts to combat the spread of infectious diseases. These problems are especially relevant for the United States with the spectacle of President Trump's \"big, beautiful border wall\" used as leverage to maintain political and economic power domestically and globally while confronting the coronavirus pandemic. The focus of this paper is the implementation of Trump's Zero Tolerance Policy, Migrant Protection Protocols, and the Asylum Cooperation Agreement, all aimed primarily at migrants and refugees, the homo sacer, from Central America to prevent entrance into the U.S. using the border security apparatus. These policies have adverse consequences for people dwelling throughout the hemisphere, particularly borderlanders, as the COVID-19 pandemic spreads into the Americas.
Journal Article
The Emergence of a New Security Apparatus in Greece: The Securitization of the Refugee/Covid-19 Crisis Nexus
2021
The aim of this article is to illustrate the securitization processes of the Covid-19 in Greece and the impetus they gave for the anew securitization of migrants and refugees. It is argued that their connectedness became feasible through their discursive presentation as a 'double crisis'. The central argument of this article is that two sub-components of the securitization of Covid-19 were also securitized, individuals and individual responsibility. The article hence posits the argument that these processes resulted in a quadruple securitization. More specifically, the discourse analysis conducted in speech acts of government and scientific actors reveals that migration and the refugee issue, Covid-19, individuals and individual responsibility are successfully securitized as there are all these elements articulated by the Copenhagen School – existential threats, securitizing actors, referent objects, emergency measures and audience acceptance – that make the securitization of each above issue successful. What is introduced and supported here, then, is that these securitization processes prompted the emergence of a new security apparatus in Greece.
Journal Article
‘The Maggot Within’: The state security apparatus in Ng˜ug˜?’ s Wizard of the Crow
In contemporary African nations, the functions performed by the state security apparatus have continued to cause trouble and divisions in the society. The state security apparatus , which is obliged to be non-partisan while carrying out assignments, has been manipulated by those in authority for their own profit. This anomalous attitude of the state security apparatus has been highlighted in fictional works of most African writers, as exemplified by Ng˜ug˜? wa Thiong'o. This paper therefore investigates the portrayal of the state security apparatus in Ng˜ug˜?’s Wizard of the Crow. The focus is how the agents of s tate security strive to uphold state power and, in doing so, deviate from their other constitutional role of protecting life and property. The paper further explores how the characters representing the state security apparatus in Wizard of the Crow promote shady business deals and as well systematize corruption. The overarching argument in this paper is that state security agents serve as instruments of misrule, oppression, deprivation and class control.
Journal Article
An analysis of U.S. Custom and Border Protection’s tripartite Mexico border security policy
2018
The Custom and Border Protection (CBP) border security policy was explicitly presented by former Acting Commissioner of CBP, David Aguilar, in testimony before the United States Senate Homeland Security and Governmental Affairs Committee (HSGAC) on April 4, 2017 in testimony on the subject of “Fencing Along the Southwest Border.” Important for discussion here are the key components of the DHS/CBP/Border Patrol’s strategy, or sets of policies, laying forth elements of the border walls (including barriers, fences), personnel, and technology in order to hinder, or intercept, undocumented migrants (homo sacer) from entering the United States illegally—all socially constructed. Aguilar notes in his opening remarks “Maintaining a safe and secure environment along the U.S.— Mexico border is critical. A safe and orderly border that is predicated on the strong rule of law deprives criminal organizations, drug cartels, and criminal individuals the opportunity to thrive.” In Aguilar’s testimony, when pressed by Ranking Member Senator Claire McCaskill, he set forth the current needs for CBP/Border Patrol priority of the three elements in the following order: (1) Technology (border surveillance), (2) Personnel (numbers of agents along the border), and, (3) The Border Wall (physical infrastructure: fences, walls, and vehicle barriers). The security apparatus affects dwellers along the Rio Grande and undocumented border crossers, demonstrated here with an analysis of the application of President Trump’s Zero Tolerance policy (April 6–June 20, 2018). The security framework applied in this paper will consist of theoretical approaches assessing border surveillance as a panopticon, the use of Border Patrol agents for apprehending, detaining and removing homo sacer, and the symbolism of the border wall as a spectacle and simulacrum—all understood in the pursuit of USA border security policy.
Journal Article
Kadra Centralnej Szkoły Ministerstwa Bezpieczeństwa Publicznego 1945–1947 Początki polskiego aparatu bezpieczeństwa
by
Lesiakowski, Krzysztof
in
Education
,
Security and defense
,
WW II and following years (1940 - 1949)
2016
Security apparatus was a very important vehicle which was used by communists during the fight for power after II World War. Thousands of functionaries needed the appropriate schooling. During 1945–1947 they were trained by Central School of Ministry of Public Security in Łódź. The lecturers in this School were the prewar Polish communists and so-called „kujbyszewiacy” – the graduates from NKVD [People’s Commissariat for Internal Affairs] – a course which was organized in the period between April–July 1944 in the Soviet town Kuybyshev on the river Volga. The personnel was characterized by young age and lack of professional experience. Therefore their usefulness for education of functionaries of security apparatus in the postwar Poland was minore.
Journal Article
Abu Ghraib, the security apparatus, and the performativity of power
2010
The critical discourse on U.S. military detainee abuse at Abu Ghraib prison has been dominated by Weberian-style arguments (a bureaucracy gone wrong, insufficient or badly applied administrative rules, or individuals acting as cogs in a machine). We argue that Michel Foucault's \"security apparatus\" provides a more insightful model for understanding the Abu Ghraib phenomenon. According to this model, the prison becomes a nodal point in an information-gathering nexus confronting unforeseen, emergent, and unclear events, a place where power is less disciplinary than improvisational, exercised through practical judgments about uncertain situations. The performance of such power at Abu Ghraib included the use of photography and acts that, we claim, resemble M. M. Bahktin's negative carnivalesque.
Journal Article
Toxic assets, turbulence and biopolitical security: Governing the crisis of global financial circulation
2013
Focusing on a highly significant governmental intervention in the global financial market crisis – the US Treasury Department's Troubled Assets Relief Program (TARP) of autumn 2008 – this article makes a threefold contribution to the growing literature concerned with the interstices of finance and security. First, the TARP is shown to have attempted to govern the turbulence not simply as a crisis of the markets, the banks and Wall Street, but as a problem of the biopolitical security of the US population. US$700 billion worth of toxic assets were to be purchased by the TARP in order to restore the opportunities afforded by uncertain global financial circulations for individual wealth and well-being. Second, by conceptualizing and exploring the TARP in Foucauldian terms as an 'apparatus of security', the article demonstrates how this concept can hold together analytical concerns with the biopolitical rationality of power, on the one hand, and the contingent, processual and lively forms taken by specific governmental orderings, on the other. The TARP apparatus certainly amounted to a biopolitical intervention in the crisis, but it only emerged from the relation between the discursive, material and institutional elements that made it possible. Third, the unplanned transformation of the TARP into an apparatus that targeted bank solvency and recapitalization rather than toxic assets is held, in effect, to have been a key moment that heralded a move towards techniques of preparedness and resilience designed to mitigate the dangers of uncertain global financial circulations.
Journal Article
Security, territory, and colonial populations
This chapter explores Foucault’s ([1978b] 2007) Security, Territory, Population lecture series, which situates the extremely influential Governmentality (Foucault, [1978a] 2001) lecture in the context of the 12 other lectures delivered that year (Foucault, 2000, pp. 67–71). It will also draw comparisons with The Birth of Biopolitics (Foucault, [1979b] 2008) lectures delivered the following year, which extend the methodological and empirical matter of the former work. These lectures contain explicit considerations of empire, which have been notoriously absent in Foucault’s other work (see Legg, 2007a). But they should also be of interest to postcolonial scholars who are keen to follow Young’s (2001, p. 386) injunction that postcolonial theorists consider discourses beyond the textual, so as to explore their materiality, heterogeneity and power. The lectures provide an invaluable resource to those concerned with colonial and postcolonial government, in the broad sense of the conduct of conduct.
Book Chapter