Private Security Companies in Kenya and the Impact of Chinese Actors Shuwen Zheng and Ying Xia
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Fueling Atrocities Oil and War in South Sudan
Fueling Atrocities Oil and War in South Sudan March 2018 The Sentry is an initiative of the Enough Project and Not On Our Watch (NOOW). 1 The Sentry • TheSentry.org Fueling Atrocities: Oil and War in South Sudan March 2018 Fueling Atrocities South Sudan’s leaders use the country’s oil wealth to get rich and terrorize civilians, according to documents reviewed by The Sentry. The records reviewed by The Sentry describe who is financially benefiting from the conflict itself. Little has been known about the financial machinery that makes South Sudan’s continuing war possible, but these documents appear to shed new light on how the country’s main revenue source—oil—is used to fuel militias and ongoing atrocities, and how a small clique continues to get richer while the majority of South Sudanese suffer or flee their homeland. Documents reviewed by The Sentry purport to describe how funds from South Sudan’s state oil company, Nile Petroleum Corporation (Nilepet), helped fund militias responsible for horrific acts of violence. They also indicate that millions of dollars were paid to several companies partially owned by family members of top officials responsible for funding government-aligned militia or military commanders.1 One key document, part of a collection of material provided to The Sentry by an anonymous source, appears to be an internal log kept by South Sudan’s Ministry of Petroleum and Mining detailing security-related payments made by Nilepet. The document titled, “Security Expenses Summary from Nilepet as from March 2014 to Date” (“the Summary”) lists a total of 84 transactions spanning a 15-month period beginning in March 2014 and ending in June 2015. -
CBP Security Policy and Procedures Handbook HB1400-02B August 13, 2009
CBP Security Policy and Procedures Handbook HB1400-02B August 13, 2009 Security Never Sleeps FOR OFFICIAL USE ONLY VOL TOC BACK VOLUME CONTENTS 1. FOREWORD ............................................................................V 2. REVISION HISTORY ...............................................................XVII 3. PHYSICAL SECURITY HANDBOOK.............................................VII 4. INFORMATION SECURITY: SAFEGUARDING CLASSIFIED AND SENSITIVE BUT UNCLASSIFIED INFORMATION HANDBOOK ... 735 5. BADGES, CREDENTIALS AND OFFICIAL IDENTIFICATION ............. 845 WARNING: This document is FOR OFFICIAL USE ONLY (FOUO). It is to be controlled, stored, handled, transmitted, distributed, and disposed of in accordance with DHS policy relating to FOUO information. This information shall not be distributed beyond the original addressees without prior authorization of the originator. iii of 890 U.S. Department of Homeland Security Washington, DC 20229 Commissioner FOREWORD The Office of Internal Affairs (IA) Security Management Division (SMD) is responsible for establishing policies, standards, and procedures to ensure the safety and security of the U.S. Customs and Border Protection (CBP) personnel, facilities, information, and assets. IA/SMD has developed the CBP Security Policy and Procedures Handbook to provide CBP with uniform standards and procedures for the proper administration of Physical Security; Safeguarding Classified and Sensitive but Unclassified Information; and Badges, Credentials, and Official Identification.This handbook -
Guarding America: Security Guards and U.S. Critical Infrastructure Protection
Order Code RL32670 CRS Report for Congress Received through the CRS Web Guarding America: Security Guards and U.S. Critical Infrastructure Protection November 12, 2004 Paul W. Parfomak Specialist in Science and Technology Resources, Science, and Industry Division Congressional Research Service ˜ The Library of Congress Guarding America: Security Guards and U.S. Critical Infrastructure Protection Summary The Bush Administration’s 2003 National Strategy for the Physical Protection of Critical Infrastructures and Key Assets indicates that security guards are “an important source of protection for critical facilities.” In 2003, approximately one million security guards (including airport screeners) were employed in the United States. Of these guards, analysis indicates that up to 5% protected what have been defined as “critical” infrastructure and assets. The effectiveness of critical infrastructure guards in countering a terrorist attack depends on the number of guards on duty, their qualifications, pay and training. Security guard employment may have increased in certain critical infrastructure sectors since September 11, 2001, although overall employment of U.S. security guards has declined in the last five years. Contract guard salaries averaged $19,400 per year in 2003, less than half of the average salary for police and well below the average U.S. salary for all occupations. There are no U.S. federal requirements for training of critical infrastructure guards other than airport screeners and nuclear guards. Twenty-two states do require basic training for licensed security guards, but few specifically require counter-terrorism training. State regulations regarding criminal background checks for security guards vary. Sixteen states have no background check regulations. -
Frontier Services Group to Launch New Infrastructure Business Segment Seizing the “Belt and Road” Initiative Business Opportunity
For Immediate Release (Incorporated in Bermuda with limited liability) (Stock code: 500.HK) Frontier Services Group To Launch New Infrastructure Business Segment Seizing The “Belt and Road” Initiative Business Opportunity (Hong Kong, 2 April 2019) Frontier Services Group (“FSG" or "Group"; Stock code: 500.HK), today announced the launch of the new infrastructure business unit, the fourth main business segment of the Group, after Security, Logistics and Insurance. FSG will provide critical infrastructure project solutions encompassing planning and management, financing, construction and logistics, helping clients to manage their entire project value chains. The infrastructure business unit will focus on transportation corridors, energy and logistics networks as well as social housing projects in Africa and South East Asia, echoing China’s “Belt and Road” initiative. The Group intends to take part in these projects through equity investment. The new infrastructure segment will be supported by FSG’s existing capabilities to ensure advantages in securing and working on large projects, while at the same time driving demand for FSG’s services and creating synergies among its resources. China CITIC Group Corporation Ltd. has increased its shareholdings of FSG last year, maintaining as the Group's single largest shareholder. In addition, Mr. Chang Zhenming, Chairman of China CITIC Group, was appointed Chairman of the Board and a non-executive Director of FSG in December 2018, showing tremendous support to FSG’s future development. FSG has established a market-leading diversified and multi-disciplinary management and operating team equipped with extensive “Belt and Road” project experience. Their outstanding capabilities in security, logistics and insurance, combined with the Group’s global network of government and cooperative relationships with government as well as international financing channels will enable the delivery of turn-key solutions in frontier markets. -
The Growth, Adaptation and Limitations of Chinese Private Security Companies in Central Asia
THE GROWTH, ADAPTATION AND LIMITATIONS OF CHINESE PRIVATE SECURITY COMPANIES IN CENTRAL ASIA BY NIVA YAU AND DIRK VAN DER KLEY Following flawed parliamentary elections on October 4, thousands of Kyrgyz citizens took to the streets across the country to contest the elections and advocate for their own candidates. Rapidly, the government lost control, with protesters storming parliament, forcing local officials to resign and individuals appointing themselves to government positions. Taking advantage of the anarchical situation, groups began seizing local economic assets. A crowd of 300 broke into the Ishtamberdi gold mine, operated by Chinese company Full Gold Mining, expelling the Chinese workers.i Locals also seized a mine in Kichi-Chaarat, owned by China National Gold Group Corp. As Chinese companies and citizens begin to work and operate in less stable parts of the world, the government of China has felt increasingly compelled to protect them. In Central Asia, as elsewhere, Beijing has relied on four strategies to secure overseas projects: (1) Ensuring that local security services are directly involved in protecting key Chinese projects; (2) encouraging companies active in unstable environments to take greater responsibility in training and protecting their workers; (3) pushing for Chinese private security companies (PSCs) to play a more active role internationally; and (4) in a handful of cases, using Chinese security abroad to secure China’s interests, including a small People’s Armed Police (PAP) unit operating in Tajikistan’s Gorno-Badakhshan Autonomous Oblast (GBAO).ii In this paper, we explore the third strategy in China’s toolkit by examining the activities of Chinese PSCs in Central Asia, a region of vital importance to the success of the Belt and Road Initiative. -
Securing the Belt and Road Initiative: China's Evolving Military
the national bureau of asian research nbr special report #80 | september 2019 securing the belt and road initiative China’s Evolving Military Engagement Along the Silk Roads Edited by Nadège Rolland cover 2 NBR Board of Directors John V. Rindlaub Kurt Glaubitz Matt Salmon (Chairman) Global Media Relations Manager Vice President of Government Affairs Senior Managing Director and Chevron Corporation Arizona State University Head of Pacific Northwest Market East West Bank Mark Jones Scott Stoll Co-head of Macro, Corporate & (Treasurer) Thomas W. Albrecht Investment Bank, Wells Fargo Securities Partner (Ret.) Partner (Ret.) Wells Fargo & Company Ernst & Young LLP Sidley Austin LLP Ryo Kubota Mitchell B. Waldman Dennis Blair Chairman, President, and CEO Executive Vice President, Government Chairman Acucela Inc. and Customer Relations Sasakawa Peace Foundation USA Huntington Ingalls Industries, Inc. U.S. Navy (Ret.) Quentin W. Kuhrau Chief Executive Officer Charles W. Brady Unico Properties LLC Honorary Directors Chairman Emeritus Lawrence W. Clarkson Melody Meyer Invesco LLC Senior Vice President (Ret.) President The Boeing Company Maria Livanos Cattaui Melody Meyer Energy LLC Secretary General (Ret.) Thomas E. Fisher Long Nguyen International Chamber of Commerce Senior Vice President (Ret.) Chairman, President, and CEO Unocal Corporation George Davidson Pragmatics, Inc. (Vice Chairman) Joachim Kempin Kenneth B. Pyle Vice Chairman, M&A, Asia-Pacific (Ret.) Senior Vice President (Ret.) Professor, University of Washington HSBC Holdings plc Microsoft Corporation Founding President, NBR Norman D. Dicks Clark S. Kinlin Jonathan Roberts Senior Policy Advisor President and Chief Executive Officer Founder and Partner Van Ness Feldman LLP Corning Cable Systems Ignition Partners Corning Incorporated Richard J. -
Ljubljana Residents' Knowledge of and Satisfaction with Private Security Guards' Work
VARSTVOSLOVJE, Journal of Criminal Ljubljana Residents’ Justice and Security, year 21 no. 4 Knowledge of and Satisfaction pp. 366‒381 with Private Security Guards’ Work Lavra Horvat, Matevž Bren, Andrej Sotlar Purpose: The purpose of the paper was to present out how Ljubljana residents know, understand and evaluate the work of private security guards. Design/Methods/Approach: A survey by internet and telephone was conducted among Ljubljana residents. The sample included residents between 18 and 75 years of age. A combined weights method was used in order to assure the representativeness of the sample by gender and age. Findings: Residents of Ljubljana are satisfied with the work performed by private security guards. Residents’ satisfaction mainly depends on their trust in security guards’ work, the help and assistance provided by security guards, security guards’ attitude towards residents and residents’ experience with security guards’ work. Residents assess their work as stressful and dangerous, however, they still believe that security guards lack education and professionalism, which is a finding, common to many other studies. Research Limitations/Implications: The survey is limited to the Ljubljana area, so a similar survey should be carried out nationwide. Practical Implications: Findings could be used by private security companies to plan adequate processes of training, professional socialisation and public relations strategies, thus increasing the degree of security guards’ professionalism. In turn, the improved professionalism would contribute greatly to a more positive assessment of security guards by residents. Originality/Value: In Slovenia, this kind of survey was conducted for the first time among the general population, as so far similar surveys have been carried out mainly among the student population. -
A Covert Case Study of Bouncers in the Manchester Night-Time Economy
6 A COVERT CASE STUDY OF BOUNCERS IN THE MANCHESTER NIGHT-TIME ECONOMY 6.1 Manchester as a case study: my biographical and experiential backyard 124 6.2 Covert passing in a demonized subculture: body capital and interaction rituals 126 6.3 The door order and door code: folklore, stories, trust, fictive kinship, masculinity, dirty work and private policing 129 6.4 Managing situated ‘ethical moments’ on the door 138 6.5 An optic on violence 142 6.6 Emotionality, embodiment and risk-taking in ethnography 145 6.7 Conclusions: the post-fieldwork self in a study that never quite finishes 147 6.8 Learning exercise 149 07_Calvey_Ch_06.indd 123 2/28/2017 10:53:56 AM Covert research This chapter focuses on a covert retrospective participant observation case study of bouncers in the night-time economy of Manchester in the United Kingdom. I will discuss my case study, comparing it to the work of other researchers who have explored this specific area, as well as others who might echo my research journey. 6.1 Manchester as a case study: my biographical and experiential backyard The location of Manchester, the UK, for the case study, which is where I live and work, is highly strategic. The city is saturated in popular culture, being named Gunchester, Gangchester and Madchester in the past, and has been well documented by a range of popular journalists and commentators (Haslam, 1999; Swanton, 1997, 1998; Walsh, 2005; Wilson, 2002). The development of club cul- tures in Manchester has been specifically linked to urban regeneration (Lovatt, 1996). -
Private Security Companies in Kenya and the Impact Of
POLICY BRIEF NO. 53 2021 Private Security Companies in Kenya and the Impact of Chinese Actors POLICY POINTS Shuwen Zheng and Ying Xia The Kenyan government needs to resolve wage and WITHOUT THE PEOPLE’S LIBERATION ARMY’S (PLA) PROTECTION overseas, who training disputes within the should provide security for Chinese companies and citizens? How do host countries security sector and work with and private actors contribute to public security in Africa? Are current business models labor unions and the private among Chinese private security companies (PSCs) sustainable, and to what extent have security industrial association Chinese actors penetrated the local market? This policy brief examines the development and impact of Chinese PSCs in Kenya. Summarizing field interviews with different to balance conflicts between stakeholders, the analysis focuses on the legal, policy, governance, and oversight PSCs of different sizes. issues that private contracting raises in both China and Kenya. Compared with the unprecedented pace of growth in China’s investment in Africa, Chinese engagement in The Chinese government overseas security protection is far behind other sectors. Lack of market share is due to should develop a integral fierce competition among PSCs and Chinese investors’ ignorance about security needs. regulatory framework While Western PSCs’ sophisticated security solutions have squeezed Chinese PSCs out emphasizing a systemic of the market, the low awareness on behalf of Chinese investors (both state-owned and guarantee of security private-owned) has led their security budgets to dry up quickly. Besides a trade and management and emergency investment presence in Africa, Chinese policymakers should develop a more integral response processes. -
Richard Jewell Movie Release Date
Richard Jewell Movie Release Date Rebuttable Steven retransfer very tangentially while Dino remains separative and synoptical. Swell and oculomotor Curt repriced her Anglo-Irish exscind unfrequently or torpedos untunably, is Barny unbowed? Anticivic Meredith gibbets notionally. The movie chronicles the fbi and chaos, remains a release date changes their significance around parking lots checking cars in Everyman nature of movies. Is not released by his extensive media coverage including stars out and movie and jealousy mounts among this information he called as producers. Every day Movie week To Netflix HBO Max And Disney This. 'Richard Jewell' Movie Review Clint Eastwood Defends an. Clint Eastwood's Richard Jewell Movie Gets A 2019 Release. Richard Jewell Blu-ray 2019 Best Buy. Esc key of movies and movie or had the latest news that jewell, and captivating story definitely earned a release. How dull I sign except for HBO Max? Clint Eastwood's Richard Jewell intends to clear the self's name once and for talking But Richard Jewell is from movie and movies are notoriously. Is fresh good liar on Apple TV? 'Richard Jewell' movie space This Clint Eastwood-directorial. Richard Jewell Movie Trailer Video History vs Hollywood. Richard Jewell Review New Clint Eastwood Movie Vulture. Help the movie where on paper, only of movies. The film is at night most humanizing when it focuses on the snap of characters who rarely get a starring role. Both movies showing that he plays and movie theatres please try a release date may change. Kathy bates also approached the film perpetuates harmful stereotypes about two nebraskan friends who like intense crime. -
The Myth of the Scapegoat in Newspaper Coverage Of
FROM HERO TO SCAPEGOAT: THE MYTH OF THE SCAPEGOAT IN NEWSPAPER COVERAGE OF RICHARD JEWELL AS BOMBING SUSPECT – A TEXTUAL ANALYSIS by THOMAS J. MYERS (Under Direction the of Leara Rhodes) ABSTRACT In 1996, a bomb exploded in Centennial Olympic Park during a concert held as part of the celebration for the Summer Olympic Games in Atlanta, Georgia. After initially being hailed in the press as a hero for his efforts to save lives during the moments following the bombing, security guard Richard Jewell emerged as a suspect in the FBI investigation of the bombing. The story was revealed in the press by the Atlanta Journal Constitution on July 30, 1996. What followed was an intense media investigation of a man who was not arrested or charged with any crime. This study examines the existence of the Scapegoat Myth as defined by Jack Lule, in the newspaper coverage of Richard Jewell. A textual analysis of 64 newspaper articles found in the Atlanta Journal and Constitution and The New York Times forms the basis of this project. The findings show distinct patterns of the Scapegoat myth in the AJC coverage, and an overall sense of objectivity in the New York Times coverage. INDEX WORDS: Richard Jewell, Centennial Olympic Park Bombing, Summer Olympics, Master Myths, Myth of the Scapegoat, Textual Analysis FROM HERO TO SCAPEGOAT: THE MYTH OF THE SCAPEGOAT IN NEWSPAPER COVERAGE OF RICHARD JEWELL AS BOMBING SUSPECT – A TEXTUAL ANALYSIS by THOMAS J. MYERS B.S., MIAMI UNIVERSITY, 1999 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF ARTS ATHENS, GEORGIA 2005 © 2005 Thomas J. -
Private Security Companies and the Israeli Occupation Report by Who Profits Research Center January 2016 Cover Photo by Activestills
Private Security Companies and the Israeli Occupation Report by Who Profits Research Center January 2016 Cover photo by ActiveStills. Private Security Companies and the Israeli Occupation Report by Who Profits Research Center January 2016 Who Profits from the Occupation is a research center dedicated to exposing the commercial involvement of Israeli and international companies in the continued Israeli control over Palestinian and Syrian land. Currently, we focus on three main areas of corporate involvement in the occupation: the settlement industry, economic exploitation and control over population. Who Profits operates an online database which includes information concerning companies that are commercially complicit in the occupation. Moreover, the center publishes in-depth reports and flash reports about industries, projects and specific companies. Who Profits also serves as an information center for queries regarding corporate involvement in the occupation – from individuals and civil society organizations working to end the Israeli occupation and to promote international law, corporate social responsibility, social justice and labor rights. www.whoprofits.org | [email protected] | P.O.B. 1084 | Tel-Aviv 6101001, Israel NOVACT-International Institute for Nonviolent Action promotes international peace-building actions in conflict situations. The Institute has been created through the collective effort of those active in international civil society to contribute to a peaceful, just and dignified world. Understanding nonviolence as