Category Archives: Control

PLEA FOR PENALTY: REMEDIATING CONTINGENCY CONTRACT OVERSIGHT WITH EXISTING BUT UNDERUTILIZED REGULATORY MECHANISMS

PLEA FOR PENALTY: REMEDIATING CONTINGENCY CONTRACT OVERSIGHT WITH EXISTING BUT UNDERUTILIZED REGULATORY MECHANISMS You must be logged in to view this content. Click here to register  

Posted in Academic, Control | Tagged , | Leave a comment

OUT OF REACH: IMPROVING THE SYSTEM TO DETER AND ADDRESS CRIMINAL ACTS COMMITTED BY CONTRACTOR EMPLOYEES ACCOMPANYING ARMED FORCES OVERSEAS

OUT OF REACH: IMPROVING THE SYSTEM TO DETER AND ADDRESS CRIMINAL ACTS COMMITTED BY CONTRACTOR EMPLOYEES ACCOMPANYING ARMED FORCES OVERSEAS You must be logged in to view this content. Click here to register  

Posted in Academic, Control | Tagged , | Leave a comment

Is It Ethical for States to Prevent Their Citizens from Working as TCN Military and Security Contractors?

Is It Ethical for States to Prevent Their Citizens from Working as TCN Military and Security Contractors? You must be logged in to view this content. Click here to register  

Posted in Academic, Control | Tagged , | Leave a comment

Nigerian Navy makes a stand on embarked armed guards

News | 12 Oct 2017 Nigerian Navy makes a stand on embarked armed guards Nigeria The Nigerian Navy finally have now officially, clearly and unambiguously stated that the Memorandum of Understanding is… You must be logged in to view this content. … Continue reading

Posted in Africa, Control, Maritime | Tagged , , | Leave a comment

Defense bill leashes Afghanistan watchdog

Since he took over at SIGAR in 2012, John Sopko has uncovered many genuine problems in the U.S. mission in Afghanistan, especially when it comes to security-related projects. | Charles Dharapak/AP… You must be logged in to view this content. … Continue reading

Posted in Afghanistan, Control | Tagged , | Leave a comment

The politics of whitelisting: Regulatory work and typologies in commercial security

The politics of whitelisting: Regulatory work and typologies in commercial security You must be logged in to view this content. Click here to register  

Posted in Academic, Control | Tagged , | Leave a comment

SIMPLIFYING INHERENTLY GOVERNMENTAL FUNCTIONS: CREATING A PRINCIPLED APPROACH FROM ITS AD HOC BEGINNINGS

SIMPLIFYING INHERENTLY GOVERNMENTAL FUNCTIONS: CREATING A PRINCIPLED APPROACH FROM ITS AD HOC BEGINNINGS You must be logged in to view this content. Click here to register  

Posted in Academic, Control, Outsourcing/Privatization | Tagged , , | Leave a comment

Inherently Governmental Functions: A Bright Line Rule Obscured by the Fog of War

Inherently Governmental Functions: A Bright Line Rule Obscured by the Fog of War You must be logged in to view this content. Click here to register  

Posted in Academic, Control, Outsourcing/Privatization | Tagged , , | Leave a comment

Africa: Private Security in Africa – Time to Regulate the Bad and Harness the Good

Africa: Private Security in Africa – Time to Regulate the Bad and Harness the Good analysis By Julie Berg, University of Cape Town A familiar scene plays itself out daily whenever… You must be logged in to view this content. … Continue reading

Posted in Africa, Control | Tagged , | Leave a comment

The Second Largest Force: Private Military Contractors & State Responsibility

The Second Largest Force: Private Military Contractors & State Responsibility You must be logged in to view this content. Click here to register  

Posted in Academic, Control, Legal | Tagged , , | Leave a comment