Blog Profile / NGO Security

Filed Under:Industries / NGOs & Nonprofits
Posts on Regator:96
This blog is retired.
Archived Since:May 16, 2011

Blog Post Archive

An Incomplete Manifesto for Humanitarian Safety and Security Practitioners

You can’t eliminate all risk.Don’t fool yourself or others. Shit will still happen; despite your best efforts. Work on building resiliency.Boring and mundane stuff is usually more dangerous (as a whole) than sexy threats.Disease, vehicle...Show More Summary

PBS Story on Humanitarian Security

Ray Suarez of PBS NewsHour has an interview with Joel Charny of InterAction about humanitarian safety and security. Audio and transcript are here.

Afghanistan Abduction and Rescue

Dr. Dilip Joseph, a US citizen working with a small US NGO called Morning Star Development, was abducted in Kabul last Wednesday afternoon, along with two other staff members. Details are still sketchy, but Joseph was rescued on Sunday by special operations forces. Show More Summary

Transparency International Corruption Index

Transparency International recently released the latest version of their most- and least-corrupt countries report (including nifty, interactive map). Just in time for the holidays, see whose been naughty or nice. (The Washington Post...Show More Summary

Threat and Vulnerability Assessments in Seven Questions

Harm – Loss – Disruption (to an organization, its staff, its assets)1. Who might want to cause it?2. Why might they want to cause it?3. What type could they cause?4. How much impact could it have?5. How likely is it?6. What can be done to decrease the chances?7. Show More Summary

EISF Gender and Security Guidelines

About a year ago, I had the pleasure of doing an online interview with Christine Persaud on gender issues that relate to humanitarian safety and security practice. Shortly afterwards, Christine was engaged by the European Interagency Security Forum (EISF) to conduct research and write a series of guidelines on gender and security. Show More Summary

Taliban BCC Boo-Boo

For awhile now, the Taliban has been using email, Twitter, and other types of modern media as part of their communications strategy. Last week, one of their spokespersons made a classic boo-boo and sent a press release out with email, CC-ing the entire distribution list instead of using BCC:. Show More Summary

New Online Publication: Stability

There's a new online publication out called Stability: International Journal of Security and Development. I'll quote the from the site's description:"Stability is a new type of journal, one intended to present scholarly research with...Show More Summary

Conflict Zone First Aid Training

In response to a prior post on blow-out kits, several readers have asked about conflict zone first aid training. Here’s a quick rundown of what’s available in the U.S. and my thoughts on the different options (international readers,Show More Summary

A Quick Look at OPSEC

The recent (and ongoing) abduction incident in Niger is an interesting case study. In summary, two trucks loaded with armed men arrived at a CARE guest house in Dakoro. The gunmen forced their way past the guard, abducted five aid workers and a driver, and escaped toward Mali. Show More Summary

Blowout Kits for NGOs

We are all products of our own experience. As a former Emergency Medical Technician and member of a US Government Disaster Medical Assistance Team, I often find myself spending extra time and effort considering medical-related threats. Show More Summary

U.S. Army Noncombatant Evacuation Operations Manual

The always interesting Public Intelligence disclosure site recently got its hands on a copy of the U.S. Army Special Operations Forces Noncombatant Evacuation Operations manual. It presents a behind the scenes look at what happens when USG decides to evacuate citizens from a foreign country. Show More Summary

Peter Sandman on: Your Safety Problem

Effective risk communication is one of those skills I feel every humanitarian safety and security practitioner should have. Talking about risk (and getting people to listen) as well as being able to defuse situations where others become outraged are mainstays of our profession. Show More Summary

10 Things to Know About Guns

Because of high-risk conditions, at times humanitarian organizations may elect to use armed guards to protect staff, offices, and facilities. This decision is not one to be taken lightly. Including a deadly force option in a security strategy presents its own set of risks for NGOs, and the costs and benefits must be carefully weighed. Show More Summary

PechaKucha NGO Security Challenge

PechaKucha is a cool idea that grew out of the Japanese design community. It started in Tokyo nine years ago as an evening meet-up where young designers could get together and show off their work. The governing concept was simple. Your...Show More Summary

The Price of Anything Videos

Henry David Thoreau once said, "The price of anything is the amount of life you exchange for it." Several organizations have banded together and produced a series of short videos about humanitarian safety and security using this quote as a theme. Show More Summary

Password Security

Ars Technica has an excellent article on the state of password security. It used to be that if you had a password with a mix of lower and upper case letters that was at least eight or nine characters long you were pretty secure. However over the past several years, the art and science of password cracking has changed considerably. Show More Summary

Online Security for Human Rights Workers

Wired has a nice, non-technical piece on the challenges of providing effective online security for those involved in human rights work.

Haqqani Network Financing

NGO security practitioners serving organizations operating in Afghanistan and/or Pakistan will find the Haqqani Network Financing research report a fascinating and useful read. Released yesterday by the West Point Combating Terrorism Center, the comprehensive report contains sections on kidnapping, extortion and other funding practices. Show More Summary

Hacked Hotel Doors

The Black Hat security conference in Las Vegas always exposes interesting security vulnerabilities. This year is no different, with news that the Onity card lock used on millions of hotel rooms is vulnerable to a hack attack. With about...Show More Summary

Copyright © 2015 Regator, LLC