Skip to main content

The History of Private Security and Its Impact on the Modern Security Sector

  • Chapter
The Handbook of Security

Abstract

While the concept of private security is often considered to be a relatively modern phenomenon, the reality is that some form of private security has existed for centuries. Whether it is the invention of locks, or the design of ancient forts and battlements, or the provision of different people-related services, the concept of private security has existed for much longer than the modern security guard. This chapter will look at examples of early security and follow the gradual emergence of the private security industry (PSI) and what we find today. While it would be impossible in one chapter to cover the entire vast history of the industry, we have selected examples that, as we believe, show the broad spectrum within the PSI and some of the key points in the industry’s history. In looking at some of the earliest forms of private security, we will also be able to draw parallels with the industry that exists today.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  • Alford, S. (2012). The Watchers: The Secret History of the Reign of Elizabeth I. London: Penguin Books.

    Google Scholar 

  • Ascoli, D. (1979). The Queen’s Peace. London: Hamish Hamilton.

    Google Scholar 

  • Babington, A. (1969). A House in Bow Street: Crime and the Magistracy, 1740–1881. London: Macdonald London.

    Google Scholar 

  • Bartusis, M. (1992). The Late Byzantine Army: Arms and Society, 1204–1453. Philadelphia: University of Pennsylvania Press.

    Google Scholar 

  • Blassigner, J. (1979). The Slave Community: Plantation Life in the Antebellum South. Oxford: Oxford University Press.

    Google Scholar 

  • Bolt, C. (1969). The Anti-Slavery Movement and Reconstruction. Oxford: Oxford University Press.

    Google Scholar 

  • Bordewich, F. (2005). Bound for Canaan: The Epic Story of the Underground Railroad, America’s First Civil Rights Movement. New York: Amistad.

    Google Scholar 

  • Bush, M. (1996). Serfdom and Slavery: Studies in Legal Bondage. New York: Longman.

    Google Scholar 

  • Button, M. and George, B. (2006). Regulation of Private Security: Models for Analysis, in Gill, Martin (ed.) The Handbook of Security. Basingstoke: Palgrave Macmillan. pp. 563–585

    Google Scholar 

  • Buzatu, A.M. and Buckland, B. (2010). Private Military and Security Companies: Future Challenges in Security Governance. Geneva: DCAF.

    Google Scholar 

  • Byrne, R. (1991). Safecracking. London: Grafton.

    Google Scholar 

  • Clayton, T. (1967). The Protectors: The Inside Story of Britain’s Private Security Forces. London: Oldbourne.

    Google Scholar 

  • CoESS (2011). Private Security Services in Europe: Facts and Figures 2011. Belgium: CoESS.

    Google Scholar 

  • Cockayne, J. and Mears, E.S. (2009). Private Military and Security Companies: A Framework for Regulation. New York: International Peace Institute.

    Google Scholar 

  • Conference Board, The. (2003). Corporate Security Management: Organization and Spending Since 9/11. New York: Conference Board.

    Google Scholar 

  • Critchley, T.A. (1978). A History of Police in England and Wales. London: Constable.

    Google Scholar 

  • Critchley, T.A. (1992). London 1750–1830, in McCormick, Kevin and Visano, L.A. (eds.) Understanding Policing. Toronto: Canadian Scholars Press. pp. 85–112.

    Google Scholar 

  • Draper, H. (1978). Private Police. Brighton: Harvester.

    Google Scholar 

  • Dryden, J. (1808). The Works of John Dryden. Edinburgh: James Ballantyne and Co.

    Google Scholar 

  • Ellen, E. and Campbell, D. (1981). International Maritime Fraud. London: Sweet and Maxwell.

    Google Scholar 

  • Emsley, C. (2009). The Great British Bobby: A History of British Policing from the 18th Century to the Present. London: Quercus.

    Google Scholar 

  • Feachem, R. (1983). Guide to Prehistoric Scotland. London: Batsford Publishing.

    Google Scholar 

  • Foreign and Commonwealth Office (2002). Private Military Companies: Options for Regulation. London: House of Commons.

    Google Scholar 

  • Franklin, J.H. and Schweninyer, L. (1999). Runaway Slaves: Rebels on the Plantation. Oxford: Oxford University Press.

    Google Scholar 

  • George, B. and Button, M. (1997). Private Security Industry Regulation: Lessons from Abroad for the United Kingdom. International Journal of Risk, Security and Crime Prevention, 2(3) pp. 187–200.

    Google Scholar 

  • George, H. (1953). Guardians of the Queen’s Peace 1820–1953. Watford: Odhams Press.

    Google Scholar 

  • Gill, M. (ed.) (2006). The Handbook of Security. Basingstoke: Palgrave Macmillan.

    Google Scholar 

  • Goddard, H. (1956). Memoirs of a Bow Street Runner. London: Museum Press.

    Google Scholar 

  • Gustafson, T. (2012). Wheel of Fortune: The Battle for Oil and Power in Russia. Cambridge, MA: Harvard University Press.

    Book  Google Scholar 

  • Hochschild, A. (1998). King Leopold’s Ghost. Boston, MA: Mariner Books.

    Google Scholar 

  • Hoe, A. (1992). David Stirling: The Authorised Bibliography of the Creator of the SAS Alan Hoe. London: Little Brown.

    Google Scholar 

  • Horan, J. (1967). The Pinkertons: The Detective Dynasty That Made History. New York: Crown Publishers.

    Google Scholar 

  • Holmes, R (ed.) (2001). The Oxford Companion to Military History. Oxford: Oxford University Press.

    Google Scholar 

  • Howson, G. (1970). The Thief Taker General: The Rise and Fall of Jonathan Wild. London: Hutchinson.

    Google Scholar 

  • Hunigan, M. (2011). Victory for Hire: Private Securities’ Impact on Military Effectiveness. Redwood City, CA: Stanford University Press.

    Google Scholar 

  • Johnson, L. (1992). The Rebirth of Private Policing. London: Routledge.

    Google Scholar 

  • Jones, T., Newburn, T. and Smith, D. (1994). Democracy and Policing. London: Policy Studies Institute.

    Google Scholar 

  • Kolchin, P. (1987). Unfair Labour: American Slavery and Russian Serfdom. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Konstam, A. (2011). Pirates: The Complete History from 1300 BC to the Present Day. Guildford, CT: Globe Pequot Press.

    Google Scholar 

  • Krahmann, E. (2010). States, Citizens and the Privatisation of Security. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Lehr, P. (ed) (2007). Violence at Sea: Piracy in the Golden Age of Terrorism. London: Routledge.

    Google Scholar 

  • McConville, S. (1981). A History or English Prison Administration: Vol. 1: 1750–1877. London: Routledge.

    Google Scholar 

  • McCormark, J. (1993). One Million Mercenaries: Swiss Soldiers in the Armies of the Word. London: Leo Cooper.

    Google Scholar 

  • Mitchell, S. (2006). A History of the Later Roman Empire AD 284–64. London: Blackwell Publishing.

    Google Scholar 

  • Morris, N. and Rothman, D. (eds.) (1998). The Oxford History of the Prison: The Practice of Punishment in Western Society. Oxford: Oxford University Press.

    Google Scholar 

  • Newburn, T., Williamson, T. and Wright, A. (2012). Handbook of Criminal Investigation, London: Routledge.

    Google Scholar 

  • Norman, V. (2010). The Medieval Soldier. Barnsley: Pen and Sword.

    Google Scholar 

  • Peel, R. (1828). Parliamentary Committee of Enquiry. London: House of Commons.

    Google Scholar 

  • Percy, S. (2006). An Overview of the Industry and the Need for Regulation. London: International Institute for Strategic Studies.

    Google Scholar 

  • Percy, S. (2007). Mercenaries: The History of a Norm in International Relations. Oxford: Oxford University Press.

    Book  Google Scholar 

  • Radzinowicz, L. (1956). A History of English Criminal Law and Its Administration from 1750: Cross-Currents in the Movement for the Reform of the Police. London: Stevens and Sons.

    Google Scholar 

  • Rees, P. (1986). Our Sergeant: The Story of the Corps of Commissionaires. London: Leo Cooper.

    Google Scholar 

  • Reynolds, E.A. (1998). Before the Bobbies: The Nightwatch and Police Reform in Metropolitan London 1720–1830. Redwood City, CA: Stanford University Press.

    Book  Google Scholar 

  • Richard, F. (1983). Guide to Prehistoric Scotland. London: Batsford.

    Google Scholar 

  • Rowan, R.W. (1969). The Pinkertons: A Detective Dynasty. New York: Crown Publishers.

    Google Scholar 

  • Scahill, J. (2008). Blackwater: The Rise of the World’s Most Powerful Mercenary Army. New York: Perseus Books.

    Google Scholar 

  • Scahill, J. (2013). Dirty Wars: The World Is a Battlefield. New York: Nation Books.

    Google Scholar 

  • Scarborough, W.K. (1966). The Overseer: Plantation Management in the Old South. Baton Rouge, LA: Louisiana State University Press.

    Google Scholar 

  • Schreier, F. and Caparini, M. (2004). Privatising Security. Geneva: DCAF.

    Google Scholar 

  • Shearer, D. (1998). Private Armies and Military Intervention. London: International Institute for Strategic Studies.

    Google Scholar 

  • Shearing, C.D. and Johnston, L. (2013). Governing Security: Explorations of Policing and Justice. London: Routledge.

    Google Scholar 

  • Shearing, C.D. and Stenning, P.C. (1980). Private Security and its Implications: A North American Perspective. Canberra, Australia: Australian Institute of Criminology.

    Google Scholar 

  • Shorrock, T. (2009). Spies for Hire: The Secret World of Intelligence Outsourcing. New York: Simon and Schuster.

    Google Scholar 

  • Simon, J.D. (2013). Lone Wolf Terrorism: Understanding the Growing Threat. New York: Prometheus Books.

    Google Scholar 

  • Tadman, M. (1996). Speculators and Slaves: Masters, Traders and Slaves in the Old South. Madison, WIL: University of Wisconsin Press.

    Google Scholar 

  • Tobias, J.J. (1979). Crime and Police in England 1700–1900. Dublin: Gill and Macmillan.

    Google Scholar 

  • Tower, P. (1856). Slavery Unmasked. New York: Rochester.

    Google Scholar 

  • Underwood, S. (1997). Securicor: The People Business. London: CPL Books.

    Google Scholar 

  • Van Steden, R. and Sarre, R. (2007) The Growth of Private Security: Trends in the European Union. Security Journal, 2007(20), 222–235.

    Article  Google Scholar 

  • Villalobos, J. (2012). Violence in Latin America, in Zedillo and Wheeler (eds.). Rethinking the War on Drugs Through the US-Mexico Prism. New Haven, CT: Yale Center for the Study of Globalization. pp. 64–72.

    Google Scholar 

  • Yalichev, S. (1997). Mercenaries of the Ancient World. Edinburgh: Constable.

    Google Scholar 

  • Yergin, D. (2011). The Quest: Energy, Security and the Remaking of the Modern World. London: Penguin.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2014 Bruce George and Simon Kimber

About this chapter

Cite this chapter

George, B., Kimber, S. (2014). The History of Private Security and Its Impact on the Modern Security Sector. In: Gill, M. (eds) The Handbook of Security. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-67284-4_2

Download citation

Publish with us

Policies and ethics