Essay on The Department of Defense’s Use of Private Security Contractors

Essay on The Department of Defense’s Use of Private Security Contractors

Length: 4403 words (12.6 double-spaced pages)

Rating: Research Papers

Open Document

Essay Preview

Definition of Terms
Before we begin we must first understand the different definitions of proprietary and contract security operations. There are many definitions and explanations that are used to distinguish between the two but I will use the definitions provided by Fischer, in his book titled Introduction to Security. “Proprietary security operations are those that are “in-house,” or controlled entirely by the company establishing security for its operations” Fischer, Robert; Halibozek, Edward; Walters, David (2012-11-23). Introduction to Security (Kindle Locations 877-878). Elsevier Science. Kindle Edition. A good example of this would be if a company purchases all the equipment and security personnel to provide security functions for the company itself. The employees and equipment is solely used for the security operations of the company and work exclusively for the company. In this type of security operation the company has a greater influence on the employees and what they can and cannot do. It is believed that with proprietary security operations employees have a greater sense of pride with the company since they are from and part of the company. The propriety security operations could offer similar security services that a contract security can. “Contract security services, on the other hand, are those operations provided by a professional security company that contracts its services to a company” Fischer, Robert; Halibozek, Edward; Walters, David (2012-11-23). Introduction to Security (Kindle Locations 880-881). Elsevier Science. Kindle Edition. An example of contract security operations would be the same company identifies a security requirement for their company and hires a professional security company to pr...


... middle of paper ...


... Security Contractors in Afghanistan and Iraq: Background, Analysis, and Options for Congress (Research Report R40835). Retrieved from Federation of American Scientist: http://www.fas.org/sgp/crs/natsec/R40835.pdf

Sechrest, L. J. (2007, July 07). Privately Funded and Built U.S. Warships in the Quasi-War of 1797–1801 (Research Article). Retrieved from The Independent Institute: http://www.independent.org/publications/tir/article.asp?a=646

The History of Private Security. (n.d). Retrieved from http://www.ehow.com/about_5418822_history-private-security.html

The Roman Curia. (n.d). http://www.vatican.va/roman_curia/swiss_guard/swissguard/storia_en.htm

Waller, J. M. (2007). Private security contractors in America: 400 years and counting. Retrieved from http://www.iwp.edu/news_publications/detail/private-security-contractors-in-america-400-years-and-counting

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Cyber Security Policies and Defense Contractors Essay

- Abstract Cyber security policies in the private sector have been a challenging issue for major defense contractors, especially after recent attacks. As a result, the U.S. increased its strict enforcement against these companies by justifying its intervention to improve cyber security. The government would like to impose standards for companies who lack the proper protocol. Due to the revised and new procedures, corporations are responding by rejecting any congressional intervention. This has caused major friction in the relationship between the government and industry....   [tags: Cyberspace Policy Review]

Research Papers
1090 words (3.1 pages)

Private Military and Security Companies Essay

- Private Military and Security Companies The modern Private Military and Security Company (PMSC) came to be after the end of the Cold War. An increase in government interest in privatization and outsourcing combined with an age of warfare where civilians and combatants were increasing difficult to differentiate created the perfect environment for PMSCs to expand (Singer). Although PMSCs play an integral role in providing basic services for the United States military, the extent of their role must be reevaluated because they have been criticized for unscrupulous financial practices and lack of accountability and transparency....   [tags: cold war, outsourcing, private contracts]

Research Papers
909 words (2.6 pages)

Internet Security Essay

- Internet Security Internet Security is the most important aspect of information technology. It has been years since computer has been invented and to keep the information confidential we have to safeguard this information. The importance of integrating security measures into systems development. Every business has their own security systems to reach their goals of information security. The computer world created security systems in order to reduce risk, maintain confidentiality, ensure the reliability of data resources, and compliance with national security laws and privacy policies and laws....   [tags: Internet Privacy Security Web Essays]

Research Papers
1457 words (4.2 pages)

Military Issues: Defense Spending Essay

- Defense Spending Defense spending is the amount of money that a country spends on the military. This includes the people in the military, their pension plans, military intelligence, equipment and research on weapons. This is an ever changing amount, and is decided by what is happening in the world. If there is a war going on then military spending will rise sharply, in 1944 the amount spent was forty three percent of the country’s GDP. During the Korean War spending was 15 percent of the nations GDP, a high point in the post World War era....   [tags: intelligence, equipment, pensions]

Research Papers
1051 words (3 pages)

The Impact of the RSS Breach on Critical Infrastructure Essay

- RSA is a division of EMC Corporation that offers security products to businesses and government agencies. RSA’s flagship product is SecurID, a combination of two-factor authentication tokens (hardware and software) and the associated server software used in their implementation. This product aims to deliver secure remote access, including access to critical infrastructure. In 2009, it was estimated RSA had “about 40 million tokens and 250 million mobile software versions deployed in over 25,000 organizations”, including banks, government, manufacturing, and pharmaceutical companies (Rashid, 2011)....   [tags: Security ]

Research Papers
1215 words (3.5 pages)

Essay about Private Military Fighting For the US

- When asked why private security contractors are important for the U.S. military a former specialist for the United States Army replied, “It’s the extra sense of security. Strength in numbers. The United States Government won’t deploy more troops overseas but they will hire these private companies to help us out” (Ruohenen). Habib Moody, a student at Yale University, is the author of “Soldiers for Rent”. In this article written for The New Atlantis, Moody argues that the government should not be hiring companies to fight the war for our soldiers....   [tags: private security contractors]

Research Papers
1651 words (4.7 pages)

The Field Of Private Security Essay

- Colton Robinson Private Security Research Paper: Armored Transport November 21, 2015 The field of private security in the United States is growing rapidly. Whether it is for the corporate sector with building security or to your everyday home defense systems, more people are becoming aware of ways to keep their valuables safe. Crime is evolving and people have to adapt to the new ways criminals think and go about their lifestyle. They try really hard to be able to take from people, so we need to try really hard to be able to protect ourselves from their deviant behaviors....   [tags: Security, Security guard, The Brink's Company]

Research Papers
1706 words (4.9 pages)

Security and Private Issues in Ecommerce Essay

- SECURITY AND PRIVATE ISSUES IN ECOMMERCE INTRODUCTION: Privacy means that the control over data and security of one is the attempt to access the data by other unauthorized . These are two critical issues facing by both consumers and e-commerce sites alike. Since the invention of the World Wide Web , electronic commerce based on the Internet has grown from a simple idea into reality. Consumers browse through catalogs , finding the best deals, order goods and pay electronically ....   [tags: Privacy, Data Control, Security, Consumer Sites]

Research Papers
1441 words (4.1 pages)

Essay on Private Security and Critical Infrastructure Assets

- The private security and law enforcement officer as well the FBI function and responsibilities have tightened after the 9/11 attacked. Private security officers are undergoing more advanced training from latest technology system to protect the nation to terrorism to be prepared and ready in any event that might come along the way like the 9/11 attacked. After the disastrous event of the 9/11 attack numerous companies and group of people obligate themselves a thorough investigation and evaluation....   [tags: National Security ]

Research Papers
936 words (2.7 pages)

Cyber Defense Exercise Hosted By The National Security Agency Essay

- Knowledge of the techniques of the information security discipline, including encryption, access control, physical security, training, threat analysis, and authentication. As an Information Technology major at the United States Naval Academy (USNA), the faculty selected me to participate on USNA’s team for the 2010 Cyber Defense Exercise hosted by the National Security Agency. The competition, which we won, required us to design, operate, and defend our virtual network. As File Systems Manager, I was personally responsible for the encryption, user authentication, and intrusion analysis of our web server, exchange services, and databases....   [tags: Security, National security, Computer security]

Research Papers
1605 words (4.6 pages)