John Campbell Training Coordinator Tokyo

Similar documents
Security Risk Assessment Tool

NGO security coordination and other sources of support WITHIN FIRST 1-2 WEEKS. Office/compound/ facility security

COMMISSION IMPLEMENTING DECISION. of

Presentation to the WFP Executive Board

Bangladesh Visa fees for foreign nationals

Security Unit Appeal MAA00026 Mid-Year Report

APPROVED BY INTERACTION S BOARD ON JUNE 14, Suggested Guidance for Implementing InterAction s Minimum Operating Security Standards

Eligibility List 2015

Proforma Cost for international UN Volunteers for UN Partner Agencies for International UN Volunteers (12 months)

The Challenges and Recommendations of Accessing to Affected Population for Humanitarian Assistance: A Narrative Review

SUPPORT FOR LIFE. physical rehabilitation programme. couv1

Countries Ranked by Per Capita Income A. IBRD Only 1 Category iv (over $7,185)

GLOBAL Country Well-Being Rankings. D Social (% thriving) E Financial (% thriving) F Community (% thriving) G Physical (% thriving)

List of Agreements on Mutual Visa Exemption. Between the People s Republic of China and Foreign Countries

Appendix A. Crisis Indicators and Infrastructure Lending

מדינת ישראל. Tourist Visa Table

Public-Private Sector Partnerships in Disaster Reduction Private sector companies are major contributors in response to disasters worldwide

SUMMARY OF VOLUNTARY PRINCIPLES IMPLEMENTATION EFFORTS DURING 2012

THE WORLD FOOD PROGRAMME IN FACTS AND FIGURES

Impact of Transition on Health Care Delivery

Security Management Training Course Notes

Assessment of the terror threat to Denmark

Sexual Violence as Weapon of War. By Lydia Farah Lawyer & Legal researcher

Fundamentals of Energy Infrastructure Security: Risk Mitigation in the International Environment

Strategic HR Systems & Operations AAI HR Yearly Report Q1 Q4 : FY, 2013

The Effective Vaccine Management Initiative Past, Present and Future

Guidelines for DBA Coverage for Direct and Host Country Contracts

INDEX FOR RISK MANAGEMENT RESULTS 2015

PERSPECTIVES 2. Creating Common NGO Security Terminology: A Comparative Study. Anna Dick. Issued by:

International emergency response

2013 Beneficiary Satisfaction Survey on KOICA s ODA Programme Worldwide

Security Policy for ActionAid International Approved version

INSTRUCTIONS FOR COMPLETING THE USAID/TDA DEFENSE BASE ACT (DBA) APPLICATION

(b) the details of those who have been given asylum of other country, country-wise during the last three years

Moustafa Osman Disaster Management Expert

Effective Monitoring and Beneficiary Accountability Practices for Projects Implemented Remotely in Insecure Environments

Policy Guide and Template. Safety & Security

Getting credit WHO REFORMED IN GETTING CREDIT IN 2011/12?

Here are some things we ask you to keep in mind when you are asked questions:

Expression of Interest in Research Grant Applications

LIST OF PAYMENT FOR VISA AND SECURITY BOND PAYMENT FOR VISA ( RM )

epp european people s party

How To Improve Safety Of A Vehicle

Entrance Visas in Brazil (Updated on July 08, 2014)

Helping Refugees. Grade Level: High School (9-12) Concept Areas: Social Studies, Government/Civics

SCHEME OF EXAMINATION PG DIPLOMA IN CORPORATE AND INDUSTRIAL SECURITY MANAGEMENT (PGDCISM) ONE YEAR PROGRAMME

Entrance Visas in Brazil (Updated on November, 24, 2015)

Fiscal Rules and Fiscal Responsibility Frameworks for Growth in Emerging and Low-Income Countries

Brandeis University. International Student & Scholar Statistics

OFFICIAL NAMES OF THE UNITED NATIONS MEMBERSHIP

Citizens of the following nationalities are exempted from holding a visa when crossing the external borders of the SCHENGEN area:

Assessment of the Terror Threat to Denmark

A Road Map for Disaster Risk Management

Summary of GAVI Alliance Investments in Immunization Coverage Data Quality

Population below the poverty line Rural % Population below $1 a day % Urban % Urban % Survey year. National %

Chapter 4A: World Opinion on Terrorism

International SOS: Aeromedical Evacuation Seventh Fleet Operational Medical Symposium January 28, 2012

FDI performance and potential rankings. Astrit Sulstarova Division on Investment and Enterprise UNCTAD

CARE International SAFETY & SECURITY

Action required The Committee is requested to take note of the position of income and expenditure as of 30 September 2010.

Time Warner Cable Date: 03/03/2014. Phone Product Management. BCP Standard International Rates

From Big Data to Rich Data How Data Analytics Add Value to Security Risk Management. Patrick Hennies, Rainer Rex 15th European ASIS, 04/08/2016

HEALTHIEST COUNTRIES 1 to 40

EMERGENCIES 911 ABROAD

DEMOGRAPHIC AND SOCIOECONOMIC DETERMINANTS OF SCHOOL ATTENDANCE: AN ANALYSIS OF HOUSEHOLD SURVEY DATA

Ensuring Civilian Protection in Chad:

Poorest Countries of the World: Projections upto 2018

Executive Protection Facility Security Convoy Escort

NATURE OF THE THREAT OF TERRORIST ABUSE AND EXPLOITATION OF NON-PROFIT ORGANIZATIONS (NPOs)

International Fuel Prices 2012/2013

Option 1: Use the Might of the U.S. Military to End the Assad Regime

A school crisis is any event that drastically disrupts or alters a normal school day for your campus. More dynamic if the media covers the event!!

Lebara Unlimited Plan

RISK ASSESSMENT AND SECURITY PROCEDURES

Dear Delegates, It is a pleasure to welcome you to the 2016 Montessori Model United Nations Conference.

What Can I Do With the Data?

1.1 LIST OF DAILY MAXIMUM AMOUNT PER COUNTRY WHICH IS DEEMED TO BEEN EXPENDED

Monthly Report on Asylum Applications in The Netherlands and Europe

Consolidated International Banking Statistics in Japan

ACT AGAINST HUMAN TRAFFICKING

Contact Centers Worldwide

JICA Training Course Plant Variety Protection course

SLOUGH DEMOGRAPHICS. AN ANALYSYS BY Slough Race Equality Council

INDEX FOR RISK MANAGEMENT

Per Minute Rate Unlimited North America

Mineral Industry Surveys

Overview: Terrorism in 2014

Country Briefing: Jordan Multidimensional Poverty Index (MPI) At a Glance

- Safety of journalists -

Taxation Determination

Total Purchases in 2012

Investment Guidelines

New Zealand =============================== Standard Courier NZD$5.00 Rural Delivery Courier NZD $ $4.50 = $9.50. Australia (Zona A)

Outsource International Ltd

STUDENT RESOURCE KIT ASYLUM SEEKERS AND REFUGEES FACT SHEET

Background Report: 9/11, Ten Years Later

Erasmus Mundus Action 2 / External Cooperation Window Participation of Finnish Higher Education Institutions Updated 21.7.

The Education for All Fast Track Initiative

Security to go: a risk management toolkit for humanitarian aid agencies AN EISF GUIDE FOR NON-GOVERNMENTAL ORGANISATIONS

New Technologies and services - Cable Television

Transcription:

The Humanitarian Security Environment Today Thursday 17 th November 2005 9:15 10:30 John Campbell Training Coordinator Tokyo Practical Security in Conflict Zones Objectives Illustrate the importance of practical security in conflict zones Means to address the threat How to make it safer SEP 2004, protesters burn the UNHCR office in Herat, Afghanistan Car Bomb 9

June 3, 2004 Five staff working for Médecins Sans Frontieres were killed on the road between Khairkhana and Qala-I-Naw, resulting in the suspension of MSF's activities in Afghanistan. 1997 Great Lakes 26 UNHCR staff killed or disappeared 2002 West Bank 1996 Kenya 1 UNHCR staff member shot dead 1996 Chechnya 1999 Kosovo 1991 One 1 UNHCR ICRC 2000 staff member killed and 2 others 1 seriously UN wounded Peru staff Guinea staff member in mine strike. 3 JICA 1 Experts UNHCR Killed member shot dead shot staff November, member 2003 killed dead. in Afghanistan 8 ICRC members staff killed 2000 Indonesia (Aceh( Aceh) 3 NGO National Staff with Danish NGO shot dead. February 26, 2004 -Five Afghans working for an NGO are killed when their vehicle is ambushed northeast of Kabul. Trends in Security Killings and severe injuries of the staff members lead to the withdrawals of NGOs from the conflict regions due to too big of a risk to manage. However, these incidents often occur due to the management of the security operated by the organizations, such as lack of security and overconfidence. Since avoidable incidents often happen due to the lack of management quality, the authority should always make a hard decision, such as a decision of evacuations and withdrawals, when it comes to the security of the staff members. In particular, the UN security system failed adequately to analyze and utilize information made available to the system on threats against UN staff and premises. Report of the Independent Panel on Safety and Security of UN Personnel in Iraq of 20 October, 2003 (Ahtissari Report) Field Office Atambua after killing of 3 staff members. 2000 0

Decisions on starting such operations must be based on a thorough assessment of the risks, the degree to which running these risks may be warranted by humanitarian imperatives, and the political context. This assessment should be formally recorded. Recommendation #1 from Report of the Inquiry into the Deaths of Three UNHCR Staff Members in Atambua, Indonesia, on 06 September 2000 Threats Angola Chad Macedonia BiH Pakistan South Africa Chile Indonesia SL Senegal Sudan Egypt Myanmar Oman Rwanda Afghanistan Niger Guatemala Bolivia Palestine Cambodia Lao Equador Serbia Sierra Leone Sri Lanka Nepal Vietnam USA UK Bangladesh India Uzbekistan Bolivia Japan Threats by Regions What kinds of threats are out there? (Participants personal experiences in each region and other threats that can be anticipated) Examples: Weapons, making promises, ex-soldiers, being a woman, traffic accidents, landmines, ethnic tensions, resentment against foreigners, terrorists, unknown, crimes (arm robbery), environment (i.e. high altitude, lack of quality medical services etc.), military conflicts (example: Rwanda, Hutus and Tutsis conflict), earthquakes (Japan) 1

Sources of information National staff Partner agencies and NGOs Security Forces (regular and irregular) Government interlocutors Community leaders The Media The Diplomatic community Refugees (beneficiaries) Other If you are not given the information you need for your operations, then go look for it yourself! Follow the advice from authority in general, but do not always trust the overly exaggerated information! International Crisis Group crisisgroup.org 2

1. 2. UN Security Phases 1. Precautionary: Be on alert. UN Staff request security clearance 2. Restricted Movement: Higher alert. Travel authorised by senior management 3. Relocation: Essential staff only families evacuate 5. 4. Emergency Operations: Mostly all out except those directly concerned with emergency, humanitarian relief operations or security matters. National staff may remain 5. Evacuation: All remaining internationally-recruited UN staff & consultants required to leave What security risk management is A systematic and analytic process of identifying threats to your staff, assets and programmes, and actions to reduce the risk and mitigate the consequences of attack. A management tool to support decision-making Mostly something you are doing already! You do it without thinking the more experienced you are the more readily this is a fact. 3

Security risk management is NOT A magic answer to convince others that the situation is safe. A procedure that will save you from getting hurt Rocket science! Security risk assessment: four good reasons It leads to better risk management decisions It heightens staff morale confidence It provides a common language among partners, leading to common understanding and concerted action It supports accountability 4

Ways of viewing the threat Mapping by vulnerable locations In the office Armed attack Interethnic fighting Crowd violence Robbery Harassment Stress Market Etc On the road Ambush Hostage-taking Car-jacking Crowd violence Landmines/UXO At the worksite: Cross-border attack Cross-border shelling Interethnic fighting Crowd unrest Dispute between refugees Robbery Pilferage Harassment Etc Ways of viewing the threat By potential sources The population Armed attack Interethnic fighting Crowd violence Hostage taking Robbery Harassment and intimidation Extremists Crowd unrest or violence Individual disputes Terrorist attack Inciting of crowd violence Kidnapping Harassment and intimidation Threat assessment Identify the threat Assess impact Assess likelihood Mitigation measures 5

BEFORE RISK MATRIX ROJ (BEFORE MITIGATING MEASURES IMPLEMENTED) Threat Direct Bomb at Building Collateral Bomb Damage Local Demonstrations Local Occupation Client Refugee Based Demonstrations Client Occupation Based by Occupation Refugees Client Assault Based by Assault Refugee Client Refugee Based Suicide suicide Natural Disaster Low Risk Moderate Risk High Risk Extreme Risk Lowering the Level of Risks = Threat Management One must adapt him/herself to the ever-changing current situation (because the threats are always changing like everything else, depends on time and places etc.) Staff members should be constantly informed with the possible threats and risks. (The more the better, but it should be periodical: daily, weekly, monthly, etc.) What kind of impact do these changes have on the operation and threat management? How do they affect (political/authority changes, economical changes, societal changes etc.) BEFORE AFTER RISK MATRIX ROJ (BEFORE MITIGATING MEASURES IMPLEMENTED) Threat Direct Bomb at Building Collateral Bomb Damage Local Demonstrations Local Occupation Client Refugee Based Demonstrations Client Occupation Based by Occupation Refugees Client Assault Based by Assault Refugee Client Refugee Based Suicide suicide Natural Disaster Low Risk Moderate Risk High Risk Extreme Risk 6

Impact vs. Probability Graph Example (Nepal): Maoist-takeover (High Impact Low Probability) Earthquakes (High Impact High Probability) Accidents (High Impact Medium Probability) Crimes (High Impact High Probability) Q. How does one lower the level of impact and probability of each threat? A. Through threat management mitigating threats, threat assessments. Comments? 7