This book traces the history of private military companies, with a special focus on UK private forces.
Christopher Kinsey examines the mercenary companies that filled the ranks of many European armies right up to the 1850s, the organizations that operated in Africa in the 1960s and early 1970s, the rise of legally established private military companies in the late 1970s and early 1980s, and today's private and important actors in international security and post-conflict reconstruction.
He shows how and why the change from the mercenary organizations of the 1960s and 1970s...
This book traces the history of private military companies, with a special focus on UK private forces.
The U.S. military is no longer based on a Cold War self-sufficient model. Today's armed forces are a third smaller than they were during the Cold War, and yet are expected to do as much if not more than they did during those years. As a result, a transformation is occurring in the way the U.S. government expects the military to conduct operations--with much of that transformation contingent on the use of contractors to deliver support to the armed forces during military campaigns and afterwards. Contractors and War explains the reasons behind this transformation and evaluates how the...
The U.S. military is no longer based on a Cold War self-sufficient model. Today's armed forces are a third smaller than they were during the Cold War,...
Conveniently structured into five sections, The Routledge Research Companion to Outsourcing Security offers an overview of the different ways in which states have come to rely on private contractors to support interventions.
Part One puts into context the evolution of outsourcing in Western states that are actively involved in expeditionary operations as well as the rise of the commercial security sector in Afghanistan. To explain the various theoretical frameworks that students can use to study security/military outsourcing, Part Two outlines the theories behind security outsourcing....
Conveniently structured into five sections, The Routledge Research Companion to Outsourcing Security offers an overview of the different ways in wh...