{"id":13371,"date":"2014-08-14T18:30:05","date_gmt":"2014-08-14T18:30:05","guid":{"rendered":"https:\/\/iissonline.net\/2026\/?p=13371"},"modified":"2014-08-14T18:30:05","modified_gmt":"2014-08-14T18:30:05","slug":"why-private-security","status":"publish","type":"post","link":"https:\/\/iissonline.net\/2026\/why-private-security\/","title":{"rendered":"Why Private Security?"},"content":{"rendered":"<p>Christopher Mayer Director, Armed Contingency Contractor Policies and Programs at US Department of Defense Why Private Security? April 28, 2014 There are many issues which surround the use of private security&hellip;<\/p>\n<p>You must be logged in to view this content.<\/p>\n<h3>Click here to <a href=\"\/register\">register<\/a><\/h3>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Christopher Mayer Director, Armed Contingency Contractor Policies and Programs at US Department of Defense Why Private Security? April 28, 2014 There are many issues which surround the use of private security&hellip; You must be logged in to view this content. &hellip; <a href=\"https:\/\/iissonline.net\/2026\/why-private-security\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[36],"tags":[136],"class_list":["post-13371","post","type-post","status-publish","format-standard","hentry","category-outsourcingprivatization","tag-outsourcingprivatization"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Private Security? - Isenberg Institute of Strategic Satire<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/iissonline.net\/2026\/why-private-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Private Security? - Isenberg Institute of Strategic Satire\" \/>\n<meta property=\"og:description\" content=\"Christopher Mayer Director, Armed Contingency Contractor Policies and Programs at US Department of Defense Why Private Security? April 28, 2014 There are many issues which surround the use of private security&hellip; You must be logged in to view this content. &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/iissonline.net\/2026\/why-private-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Isenberg Institute of Strategic Satire\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-14T18:30:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrink_80_80\/p\/1\/000\/039\/3ab\/2b692ce.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#\\\/schema\\\/person\\\/d9e91fd1a1523b3c7eebbee93de450a1\"},\"headline\":\"Why Private Security?\",\"datePublished\":\"2014-08-14T18:30:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/\"},\"wordCount\":484,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/media.licdn.com\\\/mpr\\\/mpr\\\/shrink_80_80\\\/p\\\/1\\\/000\\\/039\\\/3ab\\\/2b692ce.jpg\",\"keywords\":[\"Outsourcing\\\/Privatization\"],\"articleSection\":[\"Outsourcing\\\/Privatization\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/\",\"url\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/\",\"name\":\"Why Private Security? - Isenberg Institute of Strategic Satire\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/media.licdn.com\\\/mpr\\\/mpr\\\/shrink_80_80\\\/p\\\/1\\\/000\\\/039\\\/3ab\\\/2b692ce.jpg\",\"datePublished\":\"2014-08-14T18:30:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#\\\/schema\\\/person\\\/d9e91fd1a1523b3c7eebbee93de450a1\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/media.licdn.com\\\/mpr\\\/mpr\\\/shrink_80_80\\\/p\\\/1\\\/000\\\/039\\\/3ab\\\/2b692ce.jpg\",\"contentUrl\":\"https:\\\/\\\/media.licdn.com\\\/mpr\\\/mpr\\\/shrink_80_80\\\/p\\\/1\\\/000\\\/039\\\/3ab\\\/2b692ce.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/why-private-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Private Security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#website\",\"url\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/\",\"name\":\"Isenberg Institute of Strategic Satire\",\"description\":\"Unpacking the Private Military Complex\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#\\\/schema\\\/person\\\/d9e91fd1a1523b3c7eebbee93de450a1\",\"name\":\"\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g\"},\"url\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Private Security? - Isenberg Institute of Strategic Satire","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/iissonline.net\/2026\/why-private-security\/","og_locale":"en_US","og_type":"article","og_title":"Why Private Security? - Isenberg Institute of Strategic Satire","og_description":"Christopher Mayer Director, Armed Contingency Contractor Policies and Programs at US Department of Defense Why Private Security? April 28, 2014 There are many issues which surround the use of private security&hellip; You must be logged in to view this content. &hellip; Continue reading &rarr;","og_url":"https:\/\/iissonline.net\/2026\/why-private-security\/","og_site_name":"Isenberg Institute of Strategic Satire","article_published_time":"2014-08-14T18:30:05+00:00","og_image":[{"url":"https:\/\/media.licdn.com\/mpr\/mpr\/shrink_80_80\/p\/1\/000\/039\/3ab\/2b692ce.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/iissonline.net\/2026\/why-private-security\/#article","isPartOf":{"@id":"https:\/\/iissonline.net\/2026\/why-private-security\/"},"author":{"name":"","@id":"https:\/\/iissonline.net\/2026\/#\/schema\/person\/d9e91fd1a1523b3c7eebbee93de450a1"},"headline":"Why Private Security?","datePublished":"2014-08-14T18:30:05+00:00","mainEntityOfPage":{"@id":"https:\/\/iissonline.net\/2026\/why-private-security\/"},"wordCount":484,"commentCount":0,"image":{"@id":"https:\/\/iissonline.net\/2026\/why-private-security\/#primaryimage"},"thumbnailUrl":"https:\/\/media.licdn.com\/mpr\/mpr\/shrink_80_80\/p\/1\/000\/039\/3ab\/2b692ce.jpg","keywords":["Outsourcing\/Privatization"],"articleSection":["Outsourcing\/Privatization"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/iissonline.net\/2026\/why-private-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/iissonline.net\/2026\/why-private-security\/","url":"https:\/\/iissonline.net\/2026\/why-private-security\/","name":"Why Private Security? - Isenberg Institute of Strategic Satire","isPartOf":{"@id":"https:\/\/iissonline.net\/2026\/#website"},"primaryImageOfPage":{"@id":"https:\/\/iissonline.net\/2026\/why-private-security\/#primaryimage"},"image":{"@id":"https:\/\/iissonline.net\/2026\/why-private-security\/#primaryimage"},"thumbnailUrl":"https:\/\/media.licdn.com\/mpr\/mpr\/shrink_80_80\/p\/1\/000\/039\/3ab\/2b692ce.jpg","datePublished":"2014-08-14T18:30:05+00:00","author":{"@id":"https:\/\/iissonline.net\/2026\/#\/schema\/person\/d9e91fd1a1523b3c7eebbee93de450a1"},"breadcrumb":{"@id":"https:\/\/iissonline.net\/2026\/why-private-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/iissonline.net\/2026\/why-private-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/iissonline.net\/2026\/why-private-security\/#primaryimage","url":"https:\/\/media.licdn.com\/mpr\/mpr\/shrink_80_80\/p\/1\/000\/039\/3ab\/2b692ce.jpg","contentUrl":"https:\/\/media.licdn.com\/mpr\/mpr\/shrink_80_80\/p\/1\/000\/039\/3ab\/2b692ce.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/iissonline.net\/2026\/why-private-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/iissonline.net\/2026\/"},{"@type":"ListItem","position":2,"name":"Why Private Security?"}]},{"@type":"WebSite","@id":"https:\/\/iissonline.net\/2026\/#website","url":"https:\/\/iissonline.net\/2026\/","name":"Isenberg Institute of Strategic Satire","description":"Unpacking the Private Military Complex","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/iissonline.net\/2026\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/iissonline.net\/2026\/#\/schema\/person\/d9e91fd1a1523b3c7eebbee93de450a1","name":"","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g"},"url":"https:\/\/iissonline.net\/2026\/author\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/phczRl-3tF","_links":{"self":[{"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/posts\/13371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/comments?post=13371"}],"version-history":[{"count":0,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/posts\/13371\/revisions"}],"wp:attachment":[{"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/media?parent=13371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/categories?post=13371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/tags?post=13371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}