Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
6,260 result(s) for "security apparatus"
Sort by:
101 spy gadgets for the evil genius
\"CREATE FIENDISHLY FUN SPY TOOLS AND COUNTERMEASURESFully updated throughout, this wickedly inventive guide is packed with a wide variety of stealthy sleuthing contraptions you can build yourself. 101 Spy Gadgets for the Evil Genius, Second Edition also shows you how to reclaim your privacy by targeting the very mechanisms that invade your space. Find out how to disable several spy devices by hacking easily available appliances into cool tools of your own, and even turn the tables on the snoopers by using gadgetry to collect information on them.Featuring easy-to-find, inexpensive parts, this hands-on guide helps you build your skills in working with electronics components and tools while you create an impressive arsenal of spy gear and countermeasures. The only limit is your imagination!101 Spy Gadgets for the Evil Genius, Second Edition: Contains step-by-step instructions and helpful illustrations Provides tips for customizing the projects Covers the underlying principles behind the projects Removes the frustration factor--all required parts are listed Build these and other devious devices: Spy camera Infrared light converter Night vision viewer Phone number decoder Phone spammer jammer Telephone voice changer GPS tracking device Laser spy device Remote control hijacker Camera flash taser Portable alarm system Camera trigger hack Repeating camera timer Sound- and motion-activated cameras Camera zoom extender \"-- Provided by publisher.
Security in transition(s)
By drawing on critical security studies in the context of a sociotechnical transition, this article calls for more attention to the presence and sometimes alternative use of mostly unobserved security practices in the materialization of everyday consumer goods and services. This call is illustrated through a discussion of the phenomenon of range anxiety and the intra-action between drivers of electric vehicles (EVs), designers, and algorithms that observe, estimate and nudge the remaining range of an EV. Inspired by Foucault and Barad, the range-anxiety discussion offers four alternative security insights. First, it supports an argument to include stress as an embodied instance of insecurity. Second, it draws attention to a security apparatus that is based on a constantly expanding assemblage around range estimates. Third, it shows how this apparatus rests on a novel algorithm that has a continuous instead of a binary output and is governed by a distributed sovereignty: where the driver simultaneously is the object of measurement, subject of governance for more efficient driving and the ultimate sovereign who decides on the trip. Lastly, the discussion highlights how range estimates not only mediate the materialization of EVs and their automobility but also (re)perform epistemological or ontological forms of uncertainty.
COVID-19, wall building, and the effects on Migrant Protection Protocols by the Trump administration: the spectacle of the worsening human rights disaster on the Mexico-U.S. border
The COVID-19 pandemic has repercussions well beyond the confines of borders. National border policies can thwart international efforts to combat the spread of infectious diseases. These problems are especially relevant for the United States with the spectacle of President Trump's \"big, beautiful border wall\" used as leverage to maintain political and economic power domestically and globally while confronting the coronavirus pandemic. The focus of this paper is the implementation of Trump's Zero Tolerance Policy, Migrant Protection Protocols, and the Asylum Cooperation Agreement, all aimed primarily at migrants and refugees, the homo sacer, from Central America to prevent entrance into the U.S. using the border security apparatus. These policies have adverse consequences for people dwelling throughout the hemisphere, particularly borderlanders, as the COVID-19 pandemic spreads into the Americas.
The Emergence of a New Security Apparatus in Greece: The Securitization of the Refugee/Covid-19 Crisis Nexus
The aim of this article is to illustrate the securitization processes of the Covid-19 in Greece and the impetus they gave for the anew securitization of migrants and refugees. It is argued that their connectedness became feasible through their discursive presentation as a 'double crisis'. The central argument of this article is that two sub-components of the securitization of Covid-19 were also securitized, individuals and individual responsibility. The article hence posits the argument that these processes resulted in a quadruple securitization. More specifically, the discourse analysis conducted in speech acts of government and scientific actors reveals that migration and the refugee issue, Covid-19, individuals and individual responsibility are successfully securitized as there are all these elements articulated by the Copenhagen School – existential threats, securitizing actors, referent objects, emergency measures and audience acceptance – that make the securitization of each above issue successful. What is introduced and supported here, then, is that these securitization processes prompted the emergence of a new security apparatus in Greece.
‘The Maggot Within’: The state security apparatus in Ng˜ug˜?’ s Wizard of the Crow
In contemporary African nations, the functions performed by the state security apparatus have continued to cause trouble and divisions in the society. The state security apparatus , which is obliged to be non-partisan while carrying out assignments, has been manipulated by those in authority for their own profit. This anomalous attitude of the state security apparatus has been highlighted in fictional works of most African writers, as exemplified by Ng˜ug˜? wa Thiong'o. This paper therefore investigates the portrayal of the state security apparatus in Ng˜ug˜?’s Wizard of the Crow. The focus is how the agents of s tate security strive to uphold state power and, in doing so, deviate from their other constitutional role of protecting life and property. The paper further explores how the characters representing the state security apparatus in Wizard of the Crow promote shady business deals and as well systematize corruption. The overarching argument in this paper is that state security agents serve as instruments of misrule, oppression, deprivation and class control. 
An analysis of U.S. Custom and Border Protection’s tripartite Mexico border security policy
The Custom and Border Protection (CBP) border security policy was explicitly presented by former Acting Commissioner of CBP, David Aguilar, in testimony before the United States Senate Homeland Security and Governmental Affairs Committee (HSGAC) on April 4, 2017 in testimony on the subject of “Fencing Along the Southwest Border.” Important for discussion here are the key components of the DHS/CBP/Border Patrol’s strategy, or sets of policies, laying forth elements of the border walls (including barriers, fences), personnel, and technology in order to hinder, or intercept, undocumented migrants (homo sacer) from entering the United States illegally—all socially constructed. Aguilar notes in his opening remarks “Maintaining a safe and secure environment along the U.S.— Mexico border is critical. A safe and orderly border that is predicated on the strong rule of law deprives criminal organizations, drug cartels, and criminal individuals the opportunity to thrive.” In Aguilar’s testimony, when pressed by Ranking Member Senator Claire McCaskill, he set forth the current needs for CBP/Border Patrol priority of the three elements in the following order: (1) Technology (border surveillance), (2) Personnel (numbers of agents along the border), and, (3) The Border Wall (physical infrastructure: fences, walls, and vehicle barriers). The security apparatus affects dwellers along the Rio Grande and undocumented border crossers, demonstrated here with an analysis of the application of President Trump’s Zero Tolerance policy (April 6–June 20, 2018). The security framework applied in this paper will consist of theoretical approaches assessing border surveillance as a panopticon, the use of Border Patrol agents for apprehending, detaining and removing homo sacer, and the symbolism of the border wall as a spectacle and simulacrum—all understood in the pursuit of USA border security policy.
Kadra Centralnej Szkoły Ministerstwa Bezpieczeństwa Publicznego 1945–1947 Początki polskiego aparatu bezpieczeństwa
Security apparatus was a very important vehicle which was used by communists during the fight for power after II World War. Thousands of functionaries needed the appropriate schooling. During 1945–1947 they were trained by Central School of Ministry of Public Security in Łódź. The lecturers in this School were the prewar Polish communists and so-called „kujbyszewiacy” – the graduates from NKVD [People’s Commissariat for Internal Affairs] – a course which was organized in the period between April–July 1944 in the Soviet town Kuybyshev on the river Volga. The personnel was characterized by young age and lack of professional experience. Therefore their usefulness for education of functionaries of security apparatus in the postwar Poland was minore.
Abu Ghraib, the security apparatus, and the performativity of power
The critical discourse on U.S. military detainee abuse at Abu Ghraib prison has been dominated by Weberian-style arguments (a bureaucracy gone wrong, insufficient or badly applied administrative rules, or individuals acting as cogs in a machine). We argue that Michel Foucault's \"security apparatus\" provides a more insightful model for understanding the Abu Ghraib phenomenon. According to this model, the prison becomes a nodal point in an information-gathering nexus confronting unforeseen, emergent, and unclear events, a place where power is less disciplinary than improvisational, exercised through practical judgments about uncertain situations. The performance of such power at Abu Ghraib included the use of photography and acts that, we claim, resemble M. M. Bahktin's negative carnivalesque.
Toxic assets, turbulence and biopolitical security: Governing the crisis of global financial circulation
Focusing on a highly significant governmental intervention in the global financial market crisis – the US Treasury Department's Troubled Assets Relief Program (TARP) of autumn 2008 – this article makes a threefold contribution to the growing literature concerned with the interstices of finance and security. First, the TARP is shown to have attempted to govern the turbulence not simply as a crisis of the markets, the banks and Wall Street, but as a problem of the biopolitical security of the US population. US$700 billion worth of toxic assets were to be purchased by the TARP in order to restore the opportunities afforded by uncertain global financial circulations for individual wealth and well-being. Second, by conceptualizing and exploring the TARP in Foucauldian terms as an 'apparatus of security', the article demonstrates how this concept can hold together analytical concerns with the biopolitical rationality of power, on the one hand, and the contingent, processual and lively forms taken by specific governmental orderings, on the other. The TARP apparatus certainly amounted to a biopolitical intervention in the crisis, but it only emerged from the relation between the discursive, material and institutional elements that made it possible. Third, the unplanned transformation of the TARP into an apparatus that targeted bank solvency and recapitalization rather than toxic assets is held, in effect, to have been a key moment that heralded a move towards techniques of preparedness and resilience designed to mitigate the dangers of uncertain global financial circulations.
Security, territory, and colonial populations
This chapter explores Foucault’s ([1978b] 2007) Security, Territory, Population lecture series, which situates the extremely influential Governmentality (Foucault, [1978a] 2001) lecture in the context of the 12 other lectures delivered that year (Foucault, 2000, pp. 67–71). It will also draw comparisons with The Birth of Biopolitics (Foucault, [1979b] 2008) lectures delivered the following year, which extend the methodological and empirical matter of the former work. These lectures contain explicit considerations of empire, which have been notoriously absent in Foucault’s other work (see Legg, 2007a). But they should also be of interest to postcolonial scholars who are keen to follow Young’s (2001, p. 386) injunction that postcolonial theorists consider discourses beyond the textual, so as to explore their materiality, heterogeneity and power. The lectures provide an invaluable resource to those concerned with colonial and postcolonial government, in the broad sense of the conduct of conduct.