The purpose of this new manual is to provide human rights defenders with additional knowledge and some tools that may be useful for improving their understanding of security and protection. It is hoped that the manual will support training on security and protection and will help defenders to undertake their own risk assessments and define security rules and procedures which suit their particular situation.
This manual is the result of over 25 years combined experience of Protection International-PI- members in working with human rights and humanitarian law and in the protection of HRD and other vulnerable groups. PI members experience originates from their former involvement and participation in Peace Brigades International – PBI-field missions and structure.
We have had the opportunity to learn from and share experiences and knowledge with hundreds of defenders in the field, as well as in workshops, meetings and discussions about security. Most of the manual’s contents have already been applied in practice, either in protection work or in training workshops with defenders. This manual is the fruit of all these exchanges, and we owe the defenders involved a huge thanks for their input. Consult online the different chapters of the manual or download them below.
Authors : Protection International Research and Training Unit Research and text by Enrique Eguren Fernández and Marie Caraj Protection International, 2009, 213 pages
INTRODUCTION – download: PDF
PART 1. PROTECTION AND SECURITY
CH 1.1 – MAKING INFORMED DECISIONS ABOUT SECURITY AND PROTECTION – download: PDF
- To become aware of the importance of analysing your working environment for security reasons.
- To learn different methods for undertaking context and stakeholder analyses
CH 1.2 – ASSESSING RISK – download: PDF
- Understanding the concepts of threats, vulnerability and capacity in security.
- Learning how to do a risk assessment.
CH 1.3 – UNDERSTANDING AND ASSESSING THREATS – download: PDF
- To get an in-depth understanding of threats and how to respond to threats.
CH 1.4 – SECURITY INCIDENTS – download: PDF
- Learning how to recognise and respond to security incidents.
CH 1.5 – PREVENTING AND REACTING TO AGGRESSION – download: PDF
- Assessing the likelihood of different kinds of aggression taking place.
- Preventing possible direct aggression against defenders.
- Carrying out counter – surveillance.
CH 1.6 – DRAWING A GLOBAL SECURITY STRATEGY – download: PDF
- Recognizing strategies and tactics already in place.
- Analysing strategies and tactics already in place.
- Defining the global strategy to occupy work space.
CH 1.7 – PREPARING A SECURITY PLAN – download: PDF
- Learning how to draft a security plan.
CH 1.8 – IMPROVING SECURITY AT WORK AND HOME – download: PDF
- Assessing security at work or at home.
- Planning, improving and checking security in offices and homes.
CH 1.9 – SECURITY FOR WOMEN HUMAN RIGHTS DEFENDERS – download: PDF
- Looking at security from the perspective of women human rights defenders.
- Providing both women and men human rights defenders with additional security/protection knowledge and tools.
CH 1.10- SECURITY IN ARMED CONFLICT AREAS – download: PDF
- Reducing the risks inherent in areas of armed conflict.
CH 1.11- SECURITY IN COMMUNICATIONS AND INFORMATION TECHNOLOGY. – download: PDF
- The huge gaps in information technology which exist throughout the world also affect human rights defenders. This chapter focuses mainly on information technology – i.e. computers and the internet1. Defenders who do not have access to computers or the internet may not find some of the contents relevant now. Instead, they urgently need the necessary means and training to enable them to use information technology in the defence of human rights.
PART 2. ORGANIZATIONAL SECURITY
CH 2.1 – ASSESSING ORGANIZATIONAL PERFORMANCE: THE “SECURITY WHEEL” – download: PDF
- Assessing your way of managing security.
- Evaluating the extent to which security is integrated into human rights defenders’ work.
CH 2.2 – MAKING SURE SECURITY RULES AND PROCEDURES ARE FOLLOWED” – download: PDF
- To think about what makes members and organisations unable or unwilling to follow security plans and procedures, and find appropriate solutions.
CH 2.3 – HOW TO IMPROVE ORGANIZATIONAL SECURITY MANAGEMENT” – download: PDF
- To learn how to manage organisational shift towards an improved security policy.
- Steps and issues around which the process will be built: – improving management of the security strategy – improving the security management implementation process – what is the entry point? What body is responsible for it? What is the starting point? How to proceed? What about the implementation? What are the pros and cons? What are the obstacles?
PART 3 SECURITY PROTOCOLS AND PROCEDURES (OPEN LIST)
CH 3.1 – HOW TO REDUCE THE RISKS CONNECTED TO AN OFFICE SEARCH AND/OR A BREAK IN – download: PDF
CH 3.2 – DETENTION, ARREST, ABDUCTION AND KIDNAPPING OF A DEFENDER” – download: PDF
CH 3.3 – SECURE MANAGEMENT OF INFORMATION – download: PDF
CH 3.4 – SECURITY AND FREE TIME – download: PDF
ANNEX I: THE UN DECLARATION ON HUMAN RIGHTS DEFENDERS – download: PDF
ANNEX II: EUROPEAN UNION GUIDELINES FOR HUMAN RIGHTS DEFENDERS – download: PDF
ANNEX III: PI ADVOCACY RECOMMENDATIONS FOR HRD – download: PDF
ANNEX IV: General Risk Outline for Specific Human Rights Defender Profile – download: PDF
SELECTED BIBLIOGRAPHY AND ADDITIONAL RESOURCES / INDEX OF CHAPTERS / THEMATIC INDEX -download: PDF
Let’s improve this Manual… Risk changes. The manual is a work in progress, and will need to be developed, improved and refined over time. Your feedback as a defender on any aspect of this manual will be invaluable.
Please send any comments and opinions – particularly in terms of your experiences of using the manual in your work. With your help, we can make this manual an increasingly useful tool for defenders all over the world.