05.01.2015 Views

Defending Human Rights: A Resource Book for Human

Defending Human Rights: A Resource Book for Human

Defending Human Rights: A Resource Book for Human

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ights defender is more vulnerable when s/he is out<br />

on the road than when located in their office (if it is<br />

well protected).<br />

The vulnerability of an NGO can be seen to be<br />

affected by various factors, such as exposure (the<br />

degree to which the staff and property of an NGO<br />

remains in dangerous or unprotected places), the<br />

impact of the work programme (if the NGO’s work<br />

has a negative impact on whichever armed actor, it<br />

makes the NGO vulnerable) etc 7 .<br />

Capacities are the strengths and resources<br />

available <strong>for</strong> a group or individual to achieve a<br />

reasonable degree of security (or respect <strong>for</strong> their/<br />

his/her human rights). Examples of capacities are<br />

training (in security, in legal issues, etc), group work<br />

as a team, etc.<br />

The risk created by threat and vulnerability can be<br />

reduced if defenders have enough capacities (the<br />

more the capacities, the lesser the risk):<br />

Risk = threats x vulnerability<br />

capacities<br />

Summarising the <strong>for</strong>mer paragraphs in the schema<br />

we are working with, in order to reduce the risk to<br />

acceptable levels we have to:<br />

• Reduce the threats<br />

Summarising the <strong>for</strong>mer paragraphs in the schema we are working with, in order to reduce the risk<br />

to acceptable levels we have to:<br />

• Reduce/improve the vulnerability factors<br />

Reduce the threats<br />

• Increase the security capacities by training in<br />

security,<br />

Reduce/improve<br />

risk assessment<br />

the vulnerability<br />

etc.<br />

factors<br />

Increase the security capacities by training in security, risk assessment etc.<br />

Situational analysis<br />

Threat assessment<br />

RISK =<br />

Targeting<br />

THREATS X VULNERABILITY<br />

CAPACITIES<br />

Reducing<br />

vulnerability<br />

Enhancing/developing<br />

capacities<br />

We must keep in mind that risk is a dynamic<br />

concept and changes with time, following changes<br />

in threats, vulnerabilities and capacities. It poses<br />

the need to assess risk periodically, and especially<br />

if there are changes in the work context, in threats<br />

or in vulnerability. For instance, risk increases<br />

dramatically when an armed actor feels surrounded;<br />

vulnerability increases when new personnel start<br />

working without proper training.<br />

Security measures like video cameras or an<br />

armoured vehicle may reduce the risk by improving<br />

vulnerability factors, but those measures do not<br />

confront the main source of risk, which come from<br />

threats and the will to execute them, if the actions<br />

against defenders enjoy impunity. For these reasons,<br />

all major interventions in protection should aim<br />

to reduce such threats, in addition to reducing<br />

vulnerability factors.<br />

Planning the work and security<br />

Security management should be integrated in each<br />

of the stages analysed when planning the work.<br />

Security occupies a specific niche when analysing<br />

the scenario and setting the aims and objectives<br />

of the work, as well as when planning the work,<br />

following it up and evaluating its results. The<br />

security guidelines occupy a specific place (in the<br />

planning stage) in the overall process, where they<br />

become living documents which receive feedback<br />

from the follow up and evaluation stages.<br />

Coping with security challenges: security<br />

management as an incremental process<br />

Security management is never complete, and<br />

is always partial and selective. There are limits<br />

that constrain the system 8 ; cognitive limits (not<br />

all factors affecting security can be grouped and<br />

treated simultaneously) and limits in the process<br />

(the timing and sequence imperatives necessary<br />

to create awareness, develop consensus, train<br />

people, ensure an adequate personnel turnover,<br />

implement activities, etc.). Security management<br />

can rarely attempt a comprehensive, long-term<br />

view: Its contribution relies on its ability to prevent<br />

incidents and to point to the need <strong>for</strong> organisational<br />

integration and co-ordination to cope with such<br />

We must keep in mind that risk is a dynamic concept and changes with time, following changes in<br />

threats, vulnerabilities and capacities. It poses the need to assess risk periodically, and especially if<br />

7 The necessary limit on the length of this document prevents us<br />

there are changes in the work context, in threats or in vulnerability. For instance, risk increases<br />

from including more detailed schema on the nature and function 8 Quinn, James B.: “Strategic change: logical incrementalism”.<br />

of the main dramatically factors of vulnerability.<br />

when an armed actor feels surrounded; vulnerability Sloan Management increases when Review new personnel Summer 1989 (pp. 45-60)<br />

start working without proper training.<br />

incidents. Maybe this is not very ambitious, but we<br />

also have to take into account that few resources are<br />

Security measures like video cameras or an armoured vehicle may reduce the risk by improving<br />

<strong>Defending</strong> <strong>Human</strong> <strong>Rights</strong>: A <strong>Resource</strong> <strong>Book</strong> <strong>for</strong> <strong>Human</strong> <strong>Rights</strong> Defenders | 2nd Edition<br />

vulnerability factors, but those measures do not confront the main source of risk, which come from<br />

13<br />

threats and the will to execute them, if the actions against defenders enjoy impunity. For these

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!