|Filed Under:||Industries / NGOs & Nonprofits|
|Posts on Regator:||96|
This blog is retired.
|Archived Since:||May 16, 2011|
You can’t eliminate all risk.Don’t fool yourself or others. Shit will still happen; despite your best efforts. Work on building resiliency.Boring and mundane stuff is usually more dangerous (as a whole) than sexy threats.Disease, vehicle...Show More Summary
Ray Suarez of PBS NewsHour has an interview with Joel Charny of InterAction about humanitarian safety and security. Audio and transcript are here.
Dr. Dilip Joseph, a US citizen working with a small US NGO called Morning Star Development, was abducted in Kabul last Wednesday afternoon, along with two other staff members. Details are still sketchy, but Joseph was rescued on Sunday by special operations forces. Show More Summary
Transparency International recently released the latest version of their most- and least-corrupt countries report (including nifty, interactive map). Just in time for the holidays, see whose been naughty or nice. (The Washington Post...Show More Summary
Harm – Loss – Disruption (to an organization, its staff, its assets)1. Who might want to cause it?2. Why might they want to cause it?3. What type could they cause?4. How much impact could it have?5. How likely is it?6. What can be done to decrease the chances?7. Show More Summary
About a year ago, I had the pleasure of doing an online interview with Christine Persaud on gender issues that relate to humanitarian safety and security practice. Shortly afterwards, Christine was engaged by the European Interagency Security Forum (EISF) to conduct research and write a series of guidelines on gender and security. Show More Summary
For awhile now, the Taliban has been using email, Twitter, and other types of modern media as part of their communications strategy. Last week, one of their spokespersons made a classic boo-boo and sent a press release out with email, CC-ing the entire distribution list instead of using BCC:. Show More Summary
There's a new online publication out called Stability: International Journal of Security and Development. I'll quote the from the site's description:"Stability is a new type of journal, one intended to present scholarly research with...Show More Summary
In response to a prior post on blow-out kits, several readers have asked about conflict zone first aid training. Here’s a quick rundown of what’s available in the U.S. and my thoughts on the different options (international readers,Show More Summary
The recent (and ongoing) abduction incident in Niger is an interesting case study. In summary, two trucks loaded with armed men arrived at a CARE guest house in Dakoro. The gunmen forced their way past the guard, abducted five aid workers and a driver, and escaped toward Mali. Show More Summary
We are all products of our own experience. As a former Emergency Medical Technician and member of a US Government Disaster Medical Assistance Team, I often find myself spending extra time and effort considering medical-related threats. Show More Summary
The always interesting Public Intelligence disclosure site recently got its hands on a copy of the U.S. Army Special Operations Forces Noncombatant Evacuation Operations manual. It presents a behind the scenes look at what happens when USG decides to evacuate citizens from a foreign country. Show More Summary
Effective risk communication is one of those skills I feel every humanitarian safety and security practitioner should have. Talking about risk (and getting people to listen) as well as being able to defuse situations where others become outraged are mainstays of our profession. Show More Summary
Because of high-risk conditions, at times humanitarian organizations may elect to use armed guards to protect staff, offices, and facilities. This decision is not one to be taken lightly. Including a deadly force option in a security strategy presents its own set of risks for NGOs, and the costs and benefits must be carefully weighed. Show More Summary
PechaKucha is a cool idea that grew out of the Japanese design community. It started in Tokyo nine years ago as an evening meet-up where young designers could get together and show off their work. The governing concept was simple. Your...Show More Summary
Henry David Thoreau once said, "The price of anything is the amount of life you exchange for it." Several organizations have banded together and produced a series of short videos about humanitarian safety and security using this quote as a theme. Show More Summary
Ars Technica has an excellent article on the state of password security. It used to be that if you had a password with a mix of lower and upper case letters that was at least eight or nine characters long you were pretty secure. However over the past several years, the art and science of password cracking has changed considerably. Show More Summary
Wired has a nice, non-technical piece on the challenges of providing effective online security for those involved in human rights work.
NGO security practitioners serving organizations operating in Afghanistan and/or Pakistan will find the Haqqani Network Financing research report a fascinating and useful read. Released yesterday by the West Point Combating Terrorism Center, the comprehensive report contains sections on kidnapping, extortion and other funding practices. Show More Summary
The Black Hat security conference in Las Vegas always exposes interesting security vulnerabilities. This year is no different, with news that the Onity card lock used on millions of hotel rooms is vulnerable to a hack attack. With about...Show More Summary