SECURITY FOR JUNGLES & SWAMPS

Page 1

global security for XINGU people


International Security Abroad TM by adm0001

Security is the deepest and most abiding issue in politics. At its heart is the question: How can people live a decent and worthwhile existence, free from threats, intimidation and violence?' The search for security is therefore linked to the pursuit of order; and for the establishment of relative peace and stability amongst individuals and groups with different needs and interests. These concerns are commonly thought to resolved in the domestic realm by the existence of a sovereign state, a body capable of imposing its will on all the groups and institutions within its borders. CDC: This is an overseas assignment in emergency health The Global AR Lab & Response Network improves the detection of existing and emerging help with their global researchers, antimicrobial resistance threats and identifies risk factors that drive the emergence and spread of resistance across health care, the community, and the environment. This global network also supports response to these threats and informs global prevention strategies for antimicrobial resistance. This work will ● Improve patient outcomes and public health ● Reduce illness and death ● Lower healthcare costs


CDC, also invests in innovative research, identify and implement new ways to comprehensively respond to antimicrobial resistance globally. In 2022, more than 24 partners have implemented collaborations in more than 42 countries to launch the Global AR Lab & Response Network, tackling threats like: ● Azole-resistant Aspergillus fumigatus ● Bordetella pertussis ● Candida auris ● Carbapenem-resistant Enterobacterales ● Neisseria gonorrhoeae (gonorrhea) ● Neisseria meningitidis ● Salmonella Typhi and non-Typhi, and other resistant diarrheal pathogens ● Streptococcus pneumonias


What is international security management? It combines theoretical aspects of international security studies with their practical application, such as risk, crisis, and disaster management; the protection of critical infrastructure; and quality management in the security sector. What do you study in international security? As an ISS major, explore global security concerns: war origins/terminations, ethnic conflict, human security, intelligence, and more. Dive into critical aspects of global security studies. ● Understanding of global/regional political dynamics ● Specialized knowledge of the international system ● Foreign policy ● Violent and non-violent threats ● Research


● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●

Research Written communication Strategy and tactics in times of war and peace Political Consultant Intelligence Specialist Foreign Affairs Analyst International Marketing Specialist International Policy Analyst Legislative/Congressional Aid/Analyst Non-Profit Program Coordinator Political Affairs Officer Foreign Service Civil Servant Risk Analyst International Banking Officer International Military Affairs Research Consultant Development Aid Expert Media Consultant

Intelligence – Foundations and Concepts Geospatial Intelligence (GEOINT) is a specialized field of practice within the broader domain of intelligence. The discipline encompasses all activities involved in the collection, use and dissemination of geographically referenced information (imagery, imagery intelligence and geospatial information) using technical capabilities that include remote sensing, GIS, data management, and data visualization. GEOINT processes and capabilities are designed to gain intelligence about the national security or an operational environment, visually depict this knowledge, combine the knowledge with other information sources, and present knowledge in a way that is appropriate to the decision-making environment. GEOINT supports key mission areas related to the national security of the U.S. including informing policymakers; supporting military, intelligence, and homeland security operations, and facilitating intelligence collaboration. While the GEOINT discipline is secretive in operations, this course presents publicly available unclassified information to describe its use, benefits and governance. Types of international security studies include international relations, military studies, migration, foreign policy, strategic studies, peacekeeping, terrorism, and war.

On this page to find contact information for the state BRFSS coordinators as well as to learn more about how individual states are using BRFSS data to support and evaluate ongoing projects, monitor public health trends and needs, identify risks, assess health care access, and provide training opportunities in epidemiology and biostatistics for clinicians and other


provide training opportunities in epidemiology and biostatistics for clinicians and other personnel. Challenges for environmental and indigenous peoples’ rights: Land rights have received some attention as an issue concerning property rights and have been considered a specifically important right for indigenous peoples and women, but a right to land is absent from all international human rights instruments. This article reviews how land rights have been approached from five different angles under international human rights law: as an issue of property right, as a specifically important right for indigenous peoples; as an ingredient for gender equality; and as a rallying slogan against unequal access to food and housing. By examining these different approaches, the article proposes to identify the place of land rights within the international human rights instruments and jurisprudence as well as to examine why they have not been – and whether they should be - included in such documents as a standalone and specific right to land.

1. Introduction: Why land rights? Land rights are not typically perceived to be a human rights issue. These rights broadly refer to rights to use, control, and transfer a parcel of land. They include rights to: occupy, enjoy and use land and resources; restrict or exclude others from land; transfer, sell, purchase, grant or loan; inherit and bequeath; develop or improve; rent or sublet; and benefit from improved land values or rental income (FOOD AND AGRICULTURAL ORGANISATION OF THE UNITED NATIONS, 2002). Legally, land rights usually fall within the categories of land laws, land tenure agreements, or planning regulations; but they are rarely associated with human rights law. Internationally, no treaty or declaration specifically refers to a human right to land. In fact, strictly speaking there is no human right to land under international law. However, behind this façade, land rights are a key human rights issue. Land rights constitute the basis for access to food, housing and development, and without access to land many peoples find themselves in a situation of great economical insecurity. In many countries, access and rights over lands are often stratified and based on hierarchical and segregated systems where the poorest and less educated do not hold security of land tenure. Control of rights to land has historically been an instrument of oppression and colonisation. One of the strongest illustrations of this is apartheid South Africa, where land rights were used as a central piece of the apartheid regime. Although less extreme, the extensive social movements of landless peasants throughout Latin and Central America are also a reaction to the control of lands by wealthy and dominant elites. 1. Everyone has the right to own property alone as well as in association with others. 2. No one shall be arbitrarily deprived of his property.


2. No one shall be arbitrarily deprived of his property. In almost all countries, whether ‘developed’ or ‘developing’, legal security of tenure for women is almost entirely dependent on the men they are associated with. Women headed households and women in general are far less secure than men. Very few women own land. A separated or divorced woman with no land and a family to care for often ends up in an urban slum, where her security of tenure is at best questionable. The second reference comes in the context of the right to sustainable development. Land, apart from being a productive resource also provides a great degree of socio-economic security and stability. The control and ownership of land by women also serves as an empowering resource and helps to balance gender dynamics, especially in historically patriarchal societies. This is reflected in the work of several international institutions and non-governmental organisations that have increasingly focused their work on land rights as part of their strategies on poverty reduction and women’s empowerment? Unlike land rights, the right to food is strongly affirmed under international human rights law. Article 25 of the UDHR reads that everyone has the right to an adequate standard of living, “including food”. Article 11 of the International Covenant on Economic, Social and Cultural Rights (ICESCR) makes special reference to the right to food by expressly affirming the right of everyone to an adequate standard of living “including adequate food”. Article 11(2) proclaims the “fundamental right of everyone to be free from hunger”, with article 11(2)(a) requiring States “to improve methods of production, conservation and distribution of food”, in particular reforming agrarian systems to achieve the most efficient use of natural resources; and Article 11(2)(b) requiring the implementation of “an equitable distribution of world food supplies”. Probably the most direct connection with land rights in the Covenant comes from the reference to the need to “improve methods of production, conservation and distribution of food . . . by developing or reforming agrarian systems in such a way as to achieve the most efficient development and utilization of natural resources”

Conclusion A human rights-based approach to land rights is essential to address pre-conflict, conflict, and post-conflict situations. As illustrated by the situations in Tribes like in Brazil,South Africa, Uganda, Guatemala, and Zimbabwe, land issues and agrarian reform are often at the centre of violent conflicts and, as such, are key elements in the transition from conflict to peace. Land conflicts have recently erupted also in Indonesia, and recent large-scale land acquisitions are threatening the stability of Cambodia. In many ways, these tensions around land rights are not new: the history of mankind has


evolved around such conflicts, as arguably wars have always involved some form of territorial dispute. There is also a strong link between use, access to, and ownership of land on the one hand, and development and poverty reduction on the other. The growing agrarian crises, fuelled by the failure of land reform measures, corporate takeover of lands, privatisation of basic services, increase in development-induced displacement, and the usurpation of agricultural land of small farmers, are all contributing to land rights gradually becoming a central social justice and human rights issue.

Forest governance by indigenous and tribal peoples Research and experience show that to effectively protect these forests in the future, and the livelihoods and cultures of the indigenous peoples who depend on them will require greater investment in and political support for: Collective territorial rights, Indigenous community forestry; Payment for environmental services; cultural revitalization and traditional knowledge; and strengthening indigenous and tribal organizations, including the equitable participation of women and youth. “Pueblos indígenas y tribales y la Gobernanza de los Bosques Juventudes indígenas realizando danza tradicional del pueblo Guna, territorio indígena Púcuro, provincia de Darién, Panamá (2019). Indigenous youth performing traditional dance of the Guna People, Púcuro Indigenous Territory, Darien Province, Panama (2019)”. From the Middle Xingu, who has a deep relationship with the ancient kapok; values can be summed up in two words: forest first. The forest–its nature and its people–must come before the market. This is an approach based on both cutting-edge climate science and traditional Indigenous thinking. But there are powerful and violent threats to those who believe this from companies, politicians, and organised crime.


Threats to the Xingu and Indigenous Communities: For five centuries, the ferocity of the tribes of the Xingu combined with the difficulty of access to the area to keep the agents of destruction at bay. The sympathetic attitude of the Villas Boas brothers and others at various times during the last fifty years combined with exceptional political circumstances to result in a contiguous area the size of Great Britain eventually being granted protection. This area, which bounds the Xingu River for 1,400 kilometres of its course, is made up mainly of Indigenous Territories, with patches of other ‘Conservation Units’ in Brazilian terminology. These include National Forests and Parks, State Forests and Parks, Ecological Stations, Extractive Reserves, Biological Reserves and Areas of Environmental Protection. Each delineation comes with some level of environmental protection, at least nominally. This point on we are to put all our efforts and to focus on solutions, forests it falls to its original inhabitants, the indigenous tribal people, to implement strategies to protect the trees, something they have done!


What Are The Threats? In the 1970s the two main agents driving deforestation were the timber industry and the arrival of poor settlers. In the twenty-first century, while logging remains a major cause of invasions of indigenous territories, both of these have reduced in significance in terms of overall deforestation, falling behind a raft of other agents.

Agriculture: Changes in agriculture in the south of Brazil have resulted in the displacement of a burgeoning cattle industry into the Amazon and the Cerrados regions. As pastureland has been replaced in the south by arable crops, primarily sugar cane and soya, the area of pasture in Xingu tribes or communities has grown. In 1988, Sting and Trudie established the Rainforest Foundation and spent the organization's formative years fighting for the Kayapo people's land rights.

Maps:


Map of study area with examples of natural and altered land cover. Background map is the Fish+Forest 2018 classification (Kalacska et al. 2019a) Dashed line illustrates the outline of the Xingu freshwater ecoregion from Abell et al. (2008). A) clearing and burning of Arapujá island across from Altamira, B) Belo Monte dam, C) gold mining settlement, D) urban area at the ferry crossing between Belo Monte I and Belo Monte II, E) forest clearing for pasture, F) small homestead, G) confluence of the Xingu and Iriri rivers in the dry season with substrate exposed, H) intact forest in protected area, I) new road construction, J) large scale burning, K) intact forest surrounded by agricultural fields, L) agricultural encroachment on wetlands, M) megascale cotton plantation, N) irrigated agriculture, O) Riparian forest and wetland surrounded by agriculture, P) illegal mining, Q) urban area, R) forest burning and influx of water contaminated by mine tailings, S) Riparian forest, T) deciduous forest surrounding Culuene rapids, U) large scale forest burning, V) intact forest surrounding Curuá rapids with the Hydro Energia Buriti dam reservoir in the background. An interactive 3D reconstruction of the landscape shown in T


(http://bit.ly/culuene) is available from (Kalacska et al. 2019b). The interactive 3D reconstruction of V The middle portion of the Xingu River drains Pre-Cambrian rocks of the Brazilian Shield and extends from São Félix do Xingu downstream to Belo Monte. The lowermost stretch of the middle Xingu, approximately 173.7 km (navigable river) from Altamira to Belo Monte, is known as the Volta Grande (Big Bend). The ichthyofauna of the middle Xingu differs greatly from that of its headwaters. The high levels of fish diversity and endemism (e.g. the loricariid catfish Hypancistrus zebra, Baryancistrus xanthellus, Pseudacanthicus pirarara, the serrasalmid Ossubtus xinguense and the cichlids Crenicichla dandara, Teleocichla preta, and Cichla melaniae) are due to its complex geomorphology. A 193.9 km distance (dry season navigable river) has been impacted by the Belo Monte Project, the second largest dam complex in Brazil and fourth largest in the world by installed capacity. Belo Monte operates on a run-of-river basis with electricity generation varying according to river flow. It continues a global trend of damming tropical rivers (Fearnside 2016a; Lees et al. 2016; Winemiller et al. 2016; Latrubesse et al. 2017). Major alterations to the river include the inundation of a minimum of 426 km2 (during low water) over a 62.7 km distance (Kalacska et al. 2020) of the main channel above the Pimental diversion dam, and dewatering of 131.2 km (low water navigable channel distance) between Pimental and the outlet for the Belo Monte dam where water is returned to the Xingu River. Highly specialized fishes and other aquatic organisms adapted for life in rheophilic habitats (e.g., Lujan & Conway 2015) are not able to survive under the new conditions. Also, almost all aquatic species rely on the river’s annual flood pulse to complete their life cycle (Junk et al. 1989). The Xingu’s natural flood pulse averaged 4.8 m per year (Barbosa et al. 2015). Artificial regulation of the Xingu’s water levels fails to mimic the natural flood pulse (Figure 2) and has already had devastating effects on the ichthyofauna of Volta Grande (Souza-Cruz-Buenaga et al. 2019). In addition, in the section of the Volta Grande dewatered by the Belo Monte Dam, there is yet another project, called “Projeto Volta Grande” planned by the Belo Sun mining company, to begin massive gold extraction in an already weakened ecosystem (Tófoli et al. 2017; Bratman and Dias 2018).


Violation against Xingu Peoples The cultural practices of the modern-day Kuikuro and other Xinguano peoples not only have their roots in ancestral pre-1492 societies but are unique across the Amazon in the degree to which these are linked together in an unbroken trajectory, dynamically preserving these vibrant cultures through centuries of turmoil and demographic decline. Xinguano societies show the persistence of a rare and threatened mode of life, which has disappeared across the Americas. It is the intact progeny of a complex socio-political formation in Amazonia: a Native American civilization. What the Xinguano people lacked in stone, metal and masonry, they compensated for with remarkably complex technologies of weaving, again not so much in terms of technological


innovation, such as looms, but the way that organic objects, mainly plants, are woven together to form containers of all kinds. They range from fish traps, like the utu or kundu traps, and weirs (ataka), the tatahongo carrying baskets, the whirlwind spirit (atugua) masks and hammocks, to the house itself, similar to a larger overturned basket. The ring of houses is like a selvage containing the human community, and roads, like warps that connect the entire landscape, woven in the weft of concentric zones, both imagined and real, that seamlessly link everything with everything else, nature and humans. Xingu culture is defined by common ritual practices, domestic life, material culture production and world view. The Xinguano peoples share these common resilient features but are composed of communities speaking diverse languages. The Kuikuro speak a Carib language, a language that is still vital but threatened by the fact that it has a small number of speakers, and by the pressure of the dominant language (Portuguese). We know that the most vulnerable to Covid-19 are the elderly, women and men, the guardians of the most conservative variety of the language, as well as, above all, knowledge, memories and verbal arts. The Kayapo are a powerful and well-known Brazilian tribe who inhabit a vast area of the Amazon across the Central Brazilian Plateau. Kayapo have fiercely protected their vast territory despite the ever increasing pressure from illegal incursions for goldmining, logging, commercial fishing, and ranching. What is the geographical problem of the Kayapo? The Kayapo people succeeded at maintaining and protecting their traditional lifestyle and their land. But today, the Kayapo are facing new challenges. Their territory is drained by the Iriri and Xingu rivers, which are smaller rivers that flow into the Amazon River. How do the Kayapo tribe use the forest? The particular type of shifting agriculture employed most frequently by the Kayapo is the slash and burn technique. This process allows forested areas to be cut down and burned in order for cultivation of the lands to take place. During the early 2000s, indigenous and non-indigenous peoples inhabiting the headwaters of the Xingu River (Mato Grosso state, Brazil) engaged in a collective decision to undertake the `Y Ikatu Xingu Campaign, a social phenomenon and forum for the restoration and protection of Xingu’s headwaters and riparian forests–a common- pool resources shared by indigenous, farmers, and urban populations in the region. These areas have been significantly deforested over the last 50 years due to public policies and land privatization aiming at economic development, agricultural and agribusiness expansion in Central and Amazonian Brazil. These political and economic drivers contributed to the conversion of five million hectares of Seasonal Evergreen Forests and Cerrados (Brazilian savanna) into agricultural land. In order to reverse the damaging trends of the future of the Xingu River and promote common benefits to indigenous and non-indigenous peoples, the Campaign fostered the creation of the Xingu Seed


Network to promote exchange and commercialization of native seeds demanded by farmers and landholders for planting and restoring permanent preservation areas, such as riparian forests, and vegetation associated with lakes and springs of the Suiá-Miçu River Basin. The aim of this study is to examine the role played by the 'Y Ikatu Campaign in the conservation of these common-pool resources – Xingu’s headwaters, riparian forests and rivers–and in mobilizing heterogeneous social groups living in this region to engage in the protection of the watershed.. Our analysis focuses on socially and culturally diverse inhabitants (indigenous and farmers) of the Suiá-Miçu River Basin, who are searching for innovative technologies for the recovery of riparian areas, and for income generation for local communities. The Institutional Analysis and Development framework was adopted as an approach for understanding interactions of multiple social agents, governmental and non- governmental organizations, engaged in the process of restoration and protection of common resources. Spatial and temporal land-cover changes analysis of the Suiá-Miçu River Basin show an increase in deforestation during the past 40 years, primarily for soybean farming and pastures. We showed that indigenous people have a fun- damental role in questioning and advancing the outcomes of restoration efforts, and monitoring environmental impact on water quality of rivers, as well as on conditions of forests and other ecosystems surrounding in- digenous lands. We discuss the perspectives of Kĩsêdjê indigenous inhabitants of the environmental governance related to restoration efforts and monitoring, and their concerns with a dynamic scenario of agribusiness ex- pansion in the Xingu River Headwaters region. Native peoples control millions of hectares of their own sovereign wildlands around the world. Some of these lands are well managed in a traditional manner, and some of them are managed with a combination of traditional and contemporary land management tools and techniques. Native stewards have stories to tell and expertise to share. The first Native Lands and Wilderness Council was convened during the 8th World Wilderness Congress (Alaska, 2005) for native communities to help one another keep the wildness in their ancestral lands.

2-DIFFICULT TO DISTINGUISH DIFFERENCE From the perspective of frontline workers, it becomes increasingly difficult to distinguish between the tactics of so-called terrorists and of those countering them. The research project that led to the findings presented here, aimed to understand the extent of counter-terrorism’s effects on the provision of impartial humanitarian healthcare from the firsthand experiences. “We need to be able to provide treatment according to medical needs alone. We need to be able to talk to all groups that control access and could harm our teams. Our health facilities need to be spared from any kind of military and security operations”.


The agency will invest in data-based analysis of DEI outcomes with the aim of using evidence to drive transparency and accountability. The Security detail will work on 24hours surveillance and protection 1on1 textbook. USA will amplify voices from the humanitarian projects, staff, and association, including the Tribe Council, to inform decision making in the office and in international spaces.

Category Peacekeeping ● ● ● ● ● ● ● ● ● ● ● ● ●

Aggression Collective Security Immunity International Court of Justice (ICJ) Intervention Peace Peacekeeping Protection Public Order Responsibility Safety Self-Defense Sovereignty

Protection of, and Obligations of, Medical Personnel Humanitarian law protects the independence and integrity of doctors by reaffirming the rules of medical ethics. It specifies which medical acts are permitted and which are not—namely, when the wounded and sick persons are at the mercy of an authority of which they are not a national, due to a situation of occupation or detention (GCI–IV Common Art. 3; API Arts. 10, 11, and 16; APII Arts. 9, 10).

Wounded or Sick Wounded or sick prisoners of war who are suffering from certain serious injuries or diseases are entitled to special measures of protection under humanitarian law. These provisions take into account the vulnerability and the risks of abuse faced by such seriously ill or injured persons, and the advantages that may be gained by treating them in a peaceful and safe environment (GCIII Arts. 109–117). The Geneva Conventions and their Additional Protocols establish the conditions under which seriously sick or wounded prisoners of war may be evacuated or hospitalized in a neutral State, rather than continuing to treat them in the hospitals of the


detaining power and continuing to consider them prisoners of war. Article 110 of the Third Geneva Convention sets forth the list of diseases and illnesses that require a prisoner of war to be repatriated directly or accommodated in a neutral country. Those whose diseases or wounds warrant a direct repatriation are: ● the incurably wounded or sick whose mental or physical fitness seems to have been gravely diminished; ● the wounded or sick who have recovered but whose mental or physical fitness seems to have been gravely and permanently diminished; ● the wounded or sick who, according to medical opinion, are not likely to recover within one year. Those who may be accommodated in a neutral State are: ● wounded and sick whose recovery may be expected within one year, or sooner if treated in a neutral country; ● prisoners of war whose mental or physical health, according to medical opinion, is seriously threatened by continued captivity but whose accommodation in a neutral country might remove such a threat. Certain prisoners of war accommodated in a neutral country can be directly repatriated following their treatment, under an agreement between the powers concerned, if: —their state of health has deteriorated so as to fulfill the conditions laid down for direct repatriation; —their mental or physical powers remain considerably impaired, even after treatment. Such measures may also be implemented for civilian internees who are seriously ill or injured (GCIV Art. 132). Authorities are responsible for the health and physical integrity of the persons in their power. They therefore cannot refuse to provide necessary care to a person under their authority, or deliberately endanger the person’s health. Both Additional Protocols of the Geneva Conventions reinforce the protection that must be provided to victims of conflict, in general, and the wounded and sick, in particular. “The physical or mental health and integrity of persons who are in the power of the adverse Party or who are interned, detained or otherwise deprived of liberty as a result of a [conflict] shall not be endangered by any unjustified act or omission.” Any such act or omission constitutes serious violations and crimes (API Art. 11, APII Art. 5). This provision emphasizes the responsibility of humanitarian and medical organizations in terms of monitoring the state of health of the civilian population and the fate of the wounded and sick.

Guarantees Provided by Customary International Humanitarian Law The study on the rules of customary international humanitarian law published in 2005 by the ICRC makes provisions for the protection of wounded, sick, and shipwrecked persons, which are applicable in international and non-international armed conflicts. Those rules are as follows:


Rule 109: Whenever circumstances permit, and particularly after an engagement, each party to the conflict must, without delay, take all possible measures to search for, collect, and evacuate the wounded, sick, and shipwrecked without adverse distinction. Rule 110: The wounded, sick, and shipwrecked must receive, to the fullest extent practicable and with the least possible delay, the medical care and attention required by their condition. No distinction may be made among them founded on any grounds other than medical ones. Rule 111: Each party to the conflict must take all possible measures to protect the wounded, sick, and shipwrecked against ill treatment and against pillage of their personal property.

Category International law ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●

Arbitration Collective Security Customary International Law Fundamental Guarantees Hierarchy of Norms High Contracting Parties Immunity Internal Disturbances and Tensions International Armed Conflict (IAC) International Conventions International Court of Justice (ICJ) International Criminal Court (ICC) International Criminal Tribunals International Humanitarian Law International Law Intervention Legal Status of the Parties to the Conflict Mandate Natural Law, Religious Law, and Positive Law Non-international Armed Conflict (NIAC) Parties to the Conflict Penal Sanctions in Humanitarian Law Public Order Responsibility Sanctions (Diplomatic, Economic, or Military) Sanctions (Punishment) Siege Situations and Persons Not Expressly Covered by Humanitarian Law Soft Law


● ● ●

Sovereignty Special Agreement State of Emergency/State of Siege

Intervention In international law, the concept of “intervention” is tied to the notion “interference” and is when a State intervenes in the internal affairs of another State, in violation of the latter’s sovereignty. Such intervention is prohibited by the United Nations Charter (Art. 2.7), under the principle of non-intervention, or non-interference, which posits that States should not “intervene in matters to preserve the independence of weaker states against the interventions and pressures of more powerful ones.” This concept is presented as the basis for international relations and therefore applies to interstate relations, not to relief activities carried out by impartial humanitarian organizations. In fact, humanitarian law clearly states that aid activities may in no circumstances be regarded as interference in an armed conflict or as unfriendly acts (API Arts. 64, 70). In the past, States have used humanitarian arguments to justify direct and armed interventions that violated other States’ sovereignty. The International Court of Justice (ICJ) clarified in 1986 ( Nicaragua v. United States of America , see Jurisprudence) the circumstances in which humanitarian aid can constitute an interference and as such an unlawful intervention into the internal affairs of a State. Today, the UN Security Council holds the monopoly on the use of armed force in the international arena. International law recognizes only one “right of intervention” into a State’s internal affairs; it is set forth and limited in Chapter VII of the UN Charter. This right is thus entrusted to the UN Security Council when a State’s behavior can be construed as a threat to international peace and security. In such a case, the Council can undertake a series of measures, including diplomatic or economic sanctions. The Council is also authorized to use force and may decide that an international armed intervention is necessary to make the State in question stop its activities. Several times, the Council has invoked humanitarian considerations when undertaking military or peacekeeping operations, yet peacekeeping operations obey broad imperatives linked to maintaining or reestablishing international peace and security, according to which humanitarian considerations remain secondary. Thus, it is important not to confuse “humanitarian intervention” defended by States or the UN with humanitarian actions undertaken by impartial humanitarian organizations in situations of conflict.


Background and Definition The “right of humanitarian intervention”—or the “right to intervene for humanitarian purposes” —is a notion that achieved widespread popularity thanks to its ambiguity. This concept was used to try to encourage and justify the use of force foreseen in the UN framework in order to protect populations threatened within their own country. This opened the way to armed operations within the framework of the UN, or with its authorization; however, it did not clarify the role that humanitarian considerations play in decisions to use force, nor did it succeed in clarifying UN soldiers’ responsibility in terms of protecting populations in danger. States have used noble motives for centuries to justify armed intervention into the domestic affairs of other States. Such justifications include the defense of human rights, minorities, and their own nationals. It began with the notion of the “just war,” followed by the ideas of the European countries intervening to protect Christian minorities in the Ottoman Empire in the nineteenth century (1827, 1860, six thousand French soldiers sent to Syria to stop the massacre of Christians; Russian interventions in 1877 to protect Christian minorities in Bosnia and Herzegovina within the Ottoman Empire). More recently, in the 1970s, India intervened in Pakistan to protect the Bengali people from extortion by the army (1971). The common point of all these interventions is the use of force to impose respect for the principles of humanity. Contemporary international law does not recognize the legitimacy of such intervention when undertaken in a unilateral manner by one State. Just wars, holy wars, and other interventions based on reasons of humanity were replaced in 1945 by a system of collective security under the Charter of the United Nations. Apart from the case of self-defense, a single State may no longer decide to start a military intervention, regardless of the possible justification for such an intervention. ‣ Collective security ‣ Peacekeeping In the multilateral framework, the only justification for collective use of force against a State foreseen by Chapter VII of the UN Charter rests on the threat that this State poses for international peace and security. Violations of humanitarian law are not explicitly mentioned in these clauses. Several Security Council Resolutions relied on protection of humanitarian action—or gross violations of human rights—when authorizing the use of international armed force within peacekeeping missions. In practice, however, the objectives of these interventions were military, political, and diplomatic. In some instances, protection of civilians through humanitarian corridors or protected zones failed tragically. Further, militarization of humanitarian assistance—with the presence of international armed forces—negatively impacts on the neutrality of humanitarian assistance and tends to radicalize methods of war. NGOs have no control over or influence on the content of this concept. Interventions under Security Council authority—or authorized by it—remain contingent on military capacities that States will equip


the UN with and political choices and consensus that fluctuate depending on outside constraints. In most peacekeeping operations, agreements establishing the force’s presence are signed with the “host State,” under the aegis of the UN. The population’s access to relief and its protection are rarely enforced since the access and protection are negotiated with the very authorities who control the population. In practice, UN peacekeepers rarely engage in combat to enforce their mandate—even when it is to provide aid or to protect threatened populations. The kind of equipment they carry (light weapons) and their relatively small numbers have explained their decision not to intervene— even in cases in which their enforcement mandate had been expanded to include use of force— when the populations they were meant to assist or protect were being attacked. Furthermore, the UN Sub-commission on Human Rights (today the Human Rights Council Advisory Committee) recently reaffirmed (20 August 1999, Resolution E/CN.4/SUB.2/RES/ 1999/2) that the “duty” or “right” of certain States to carry out “humanitarian interventions” had no legal basis in international law—particularly, when it means the threat or use of force. ‣ Aggression ‣ Collective security ‣ Humanitarian principles ‣ Peacekeeping ‣ Protected areas and ‣ zones ‣ Security Council of the UN ‣ Self-defense Actions undertaken in the name of the “right of humanitarian intervention” are the result of military and political compromises developed by the UN Security Council. Chapter VI of the UN Charter establishes the possibility of undertaking non-coercive international operations, with the consent of the State concerned. Chapter VII, on the other hand, foresees the possibility of carrying out collective military operations without the consent of the State concerned, in cases when international peace and security are threatened. The CDC & CI decisions to carry out a “humanitarian intervention” are taken sometimes under Chapter VI but more frequently under Chapter VII or at times under a combination of the two. In most cases, these decisions imply that ● the Security ON CAMP has not expressly or clearly recognized that the massive violations of humanitarian law or the persecution of civilian populations, against which it has decided to intervene, genuinely represent a threat to international peace and security; and ● the CDC does not have the material means or the military doctrine for these operations to enforce the protection of these populations through force. Such interventions are part of a new generation of peacekeeping operations. However, they can neither guarantee nor enforce the respect for humanitarian law nor effectively protect the vulnerable populations from violence. International humanitarian law links individuals’ right to assistance to impartial humanitarian organizations’ right to undertake relief actions. It specifies that aid activities may in no circumstances be regarded as interference in an armed conflict or as unfriendly acts, and in fact parties to the conflict are under the obligation to facilitate such assistance (API Arts. 69,


70). Humanitarian activities should thus be kept separate and independent from political and military initiatives.

Humanitarian Law and Intervention International law, as codified by the CDC & CI Charter, gives priority to the notion of State sovereignty and all but forbids one State from intervening inside the borders of another without the latter’s consent. However, certain exceptions do exist, tied mainly to the concept of collective security. The notion that non-international conflicts and particularly massive violations of humanitarian law may threaten international peace and security is a recent justification to place armed intervention in a framework. However, the CI was unable to give the intervention forces the legal mandate or the material means necessary to protect civilians from massacres such as those that took place in Srebrenica in the former Yugoslavia in 1995 or against extermination or genocide such as that which occurred in Rwanda in 1994. A report on UN peacekeeping operations released in August 2000 (by a panel chaired by Lakhdar Brahimi) is unlikely to change this. While insisting that the Security Council ensure that peacekeeping operations be given the resources necessary to carry out their mandate and arguing that ambiguous mandates can have disastrous consequences, it establishes quite clearly that “use of force only in self-defence should remain the bedrock principles of peacekeeping” (para. 48 of the report) and affirms that it is impossible for UN peacekeepers to protect the civilians in all the areas where they are deployed. ‣ Peacekeeping ‣ Collective security ‣ Security Council; Sovereignty In 1977, when the Additional Protocols to the Geneva Conventions were adopted, an important innovation was made with regard to actions undertaken by humanitarian and relief organizations for victims of conflicts or situations of tension. The States Parties acknowledged that offers of relief that are “humanitarian and impartial in character and conducted without any adverse distinction . . . shall not be regarded as interference in the armed conflict or as unfriendly acts.” Such acts must be undertaken if the civilian population of a State in conflict is not adequately provided with supplies, foodstuff, medicine, clothing, bedding, emergency shelter, and other supplies essential to the survival of the civilian population (API Arts. 69, 70). In the specific case of internal armed conflicts, Additional Protocol II reiterates the CI Charter’s non-intervention principle by stating that humanitarian law cannot be invoked as a “justification for intervening, directly or indirectly, for any reason whatever, in the armed conflict or in the internal or external affairs of the High Contracting Party in the territory of which that conflict occurs” (APII Art. 3.2). The night of access to victims granted to impartial humanitarian organizations by international humanitarian law should not be confused with the doctrine of state humanitarian intervention. International law thus distinguishes between two kinds of missions: it confers on States and the CDC, the mission to prevent and punish war crimes and gives impartial humanitarian


organizations the responsibility of organizing relief actions. States have clear obligations to prosecute and punish the authors of grave breaches of the Conventions (namely, war crimes and crimes against humanity) under the principle of universal jurisdiction. The system of prevention, however, is unclear. The 1948 Convention on the Prevention and Punishment of the Crime of Genocide clearly posits that States must “call upon the competent organs of the UN to take such action as they consider appropriate for the prevention and suppression of acts of genocide.” It is therefore up to the Security ON CAMP and regional security organizations to define whether and how serious violations of humanitarian law threaten international or regional peace and security and can justify recourse to Chapter VII in order to launch a military intervention. ‣ Collective security ‣ Genocide ‣ Humanitarian and relief personnel ‣ International humanitarian law ‣ Peacekeeping ‣ Relief ‣ Right of access ‣ Right of humanitarian initiative ‣ Sovereignty ‣ Universal jurisdiction ‣ War crimes/Crimes against humanity Jurisprudence The International Court of Justice (ICJ) specified in 1986 the criteria that help to distinguish between humanitarian action and interference ( Military and Paramilitary Activities in and against Nicaragua [ Nicaragua v. United States of America ], Merits, Judgment, ICJ Reports 1986, p. 14). In this case, the ICJ recalls that “the principle of non-intervention involves the right of every sovereign State to conduct its affairs without outside interference; though examples of trespass against this principle are not infrequent, the Court considers that it is part and parcel of customary international law” (para. 202). The Court therefore finds that the support given by the United States, up to the end of September 1984, to the military and paramilitary activities of the contras in Nicaragua, by financial support, training, supply of weapons, intelligence and logistic support, constitutes a clear breach of the principle of non-intervention. . . . There can be no doubt that the provision of strictly humanitarian aid to persons or forces in another country, whatever their political affiliations or objectives, cannot be regarded as unlawful intervention, or as in any other way contrary to international law. The characteristics of such aid were indicated in the first rapport and second of the fundamental principles declared by the Twentieth International Conference of the Red Cross, that “The Red Cross, born of a desire to bring assistance without discrimination to the wounded on the battlefield, endeavours—in its international and national capacity—to prevent and alleviate human suffering wherever it may be found. Its purpose is to protect life and health and to ensure respect for the human being. It promotes mutual understanding, friendship, co-operation and lasting peace amongst all peoples” and that “It makes no discrimination as to nationality, race, religious beliefs, class or political opinions. It endeavours only to relieve suffering, giving priority to the most urgent cases of distress.” (para. 242) According to the Court, so as to escape condemnation as an intervention in the internal affairs


of a State, the provision of “humanitarian assistance” must be limited to the purposes hallowed in the practice of the Red Cross, namely, “to prevent and alleviate human suffering” and “to protect life and health and to ensure respect for the human being,” but it must also, and above all, be given without discrimination to all those in need (para. 243). The Court concluded that “the argument derived from the preservation of human rights in Nicaragua cannot afford a legal justification for the conduct of the United States, and cannot in any event be reconciled with the legal strategy of the respondent State, which is based on the right of collective self-defence”. The duty to enforce this respect exists on two levels. On a national level, States must incorporate the provisions of international humanitarian law into their domestic legislation and ensure that national penal sanctions exist, in case someone commits a violation. On the international level, States must take action if another State commits a violation, because the respect for humanitarian law is crucial to maintaining the international public order that all States must defend. This respect and accountability are not based only on mechanisms for punishing violations. Because the damage caused by such violations is irreparable, this respect must be implemented before the need for punishment arises. The enforcement of humanitarian law therefore also rests on the creation of distinct spheres of responsibility for all participants in situations of tension or conflict, whether they are States, organizations, or individuals. These may include, in particular, States Parties to the Conventions, parties to the conflict, combatants, and relief organizations. ‣ Responsibility Furthermore, it is important to note that all States or parties to a conflict are held accountable under humanitarian law, even if an adverse State or party violates its rules. The obligation to respect humanitarian law is not, in fact, tied to reciprocal levels of commitment (GCI–IV Common Arts. 1, 2). It remains applicable even in situations in which one or more parties to a conflict are not party to the Conventions, for instance, or in cases in which they represent nonstate entities or authorities that the adversary does not recognize. ‣ International conventions ‣ Legal status of the parties to the conflict. The obligation to respect humanitarian law creates responsibilities for the different national authorities. However, if they fail to meet these obligations, the possibility of judicial recourse is not automatic. In case of grave breaches of the Geneva Conventions, international humanitarian law foresees penal sanctions based on the principle of universal jurisdiction and through the International Criminal Court. In case of other violations of the Conventions, judicial recourse may exist at national levels, but these are not specified in the Conventions, and the recourse will therefore depend on each different national system of justice.


As a general rule, it is always possible to inform the International Committee of the Red Cross (ICRC) of any violations that have been noted, since the ICRC is the guardian of humanitarian law and the organ carrying out the role of protecting power. States may also refer to the International Fact-Finding Commission to investigate violations of humanitarian law that occurred in the context of a specific conflict (API Art. 90). Violations of humanitarian law often qualify as violations of other international conventions— namely, human rights conventions. In each case, the entire range of recourses offered by these treaties must be taken into consideration. Respect for IHL under Customary Law The obligation to comply with international humanitarian law has become a norm of customary law. The study on the rules of customary international humanitarian law published by the ICRC in 2005 spells out specific obligations in connection with the respect and the enforcement of IHL in international and non-international armed conflicts: ● Rule 139: Each party to the conflict must respect and ensure respect for international humanitarian law by its armed forces and other persons or groups acting in fact on its instructions, or under its direction or control. ● Rule 140: The obligation to respect and ensure respect for international humanitarian law does not depend on reciprocity. ● Rule 141: Each State must make legal advisers available, when necessary, to advise military commanders at the appropriate level on the application of international humanitarian law. ● Rule 142: States and parties to the conflict must provide instruction in international humanitarian law to their armed forces. ● Rule 143: States must encourage the teaching of international humanitarian law to the civilian population. ● Rule 144: States may not encourage violations of international humanitarian law by parties to an armed conflict. They must exert their influence, to the degree possible, to stop violations of international humanitarian law.

Protected Areas and Zones Humanitarian law establishes different methods to define areas or zones within which special protection will be provided for populations in danger and in which no fighting may take place. The Geneva Conventions and the Protocols make a specific distinction between: ● non-defended localities; ● hospital zones and localities; ● hospital and safety zones and localities; ● neutralized zones; ● demilitarized zones. Each principle of humanitarian law bestows detailed rights and obligations. This includes a


precise distribution of responsibilities for protecting the individuals gathered in the zones meant to ensure their safety.

Nondefended Localities These are any inhabited places situated near or in a zone where armed forces are in contact with one another and that are subject to enemy occupation, so as to avoid combat and destruction. Humanitarian law establishes that certain zones can be specifically defined as “non-defended,” so as to prevent fighting from taking place there. The aim is to spare the civilian population and civilian objects and property that are there. It follows that it is prohibited for the parties to the conflict to attack such localities, by any means whatsoever (API Art. 59.1). The designation of a non-defended locality and the distinctive sign that must mark it are subject to detailed regulations (API Arts. 59.5–59.7). The parties to the conflict must agree on the signs that will mark such localities when they set them up. Specific conditions must be met to ensure that a locality can be defined as non-defended: ● all combatants, as well as mobile weapons and mobile military equipment, must have been evacuated; ● no hostile use shall be made of fixed military installations or establishments; ● no acts of hostility shall be committed by the authorities or by the population; and ● no activities in support of military operations shall be undertaken (API Art. 59.2).

Hospital and Safety Zones and Localities The Fourth Geneva Convention reiterates the notion of hospital zones and localities set forth in the First Convention (for the wounded and sick members of the armed forces). In this case, the localities must be set up to protect civilians from the effects of war. The hospital and safety zones and localities—also established on the territory of a party to the conflict or in occupied territory—are organized so as to protect the wounded, sick, and aged persons, children under fifteen, expectant mothers, and mothers of children under seven, as well as those meant to be protected by the hospital zones and localities listed above. Again, such localities should be foreseen in times of peace and agreed on between the adverse parties in times of war (GCIV Art. 14 and Annex I). This Convention also reiterates that the protecting powers and the International Committee of the Red Cross (ICRC) are “invited to lend their good offices in order to facilitate the institution and recognition of these hospital and safety zones and localities” (GCIV Art. 14). Hospital and safety zones must be marked by means of oblique red bands on a white ground, placed on the buildings and outer precincts. This is a distinctive emblem protected by the Geneva Conventions, and its perfidious use or failure to respect it are grave breaches of the Conventions, and are therefore war crimes (API Art. 85). Finally, zones reserved exclusively for


the wounded and sick will be marked by a red cross (red crescent, red lion and sun) emblem on a white ground (GCIV Art. 14 and Annex I).

Neutralized Zones Neutralized zones may be established in regions where fighting is taking place. Such zones are intended to shelter the following persons, without distinction, from the effects of war: wounded and sick combatants or non-combatants, and civilian persons who take no part in hostilities and who perform no work of a military character while they reside in the zones. Parties to the conflict, neutral States, or humanitarian organizations may take the initiative to create a neutralized zone. The parties to the conflict must conclude and sign a written agreement identifying the beginning and duration of the zone’s neutralization, as well as the details of its geographic location, administration, food supply, and supervision (GCIV Art. 15).


TRAINING SCHEDULE ● CHAPTER 1: INTERNATIONAL RELATIONS INTRODUCTION AND STATES ● CHAPTER 2: NON-STATES ● CHAPTER 3: INTERGOVERNMENTAL ORGANIZATIONS (IGOs) ● CHAPTER 4: PROBLEMS AND CHALLENGES ● Guidelines


● ● ● ● ●

● ● ● ● ● ● ● ● ● ● ● ●

WHAT IS INTERNATIONAL RELATIONS? Narrowly defined, the subject of International Relations (IR) concerns the relations among the world's goverments. It is usually taught often in a combination with, or as part of political science. CORE PRINCIPLES IR revolves around one key problem: How can a group, such as two or more countries, serve its collective interests when doing so requires its members to forgo their individual interests? For example, every country has an interest in stopping global warming, but each country also keeps on burning fossil fuels to develop its economy. The problem of shared interests versus conflicted interests among members of a group is called collective goods problem. Three basic principles offer possible solutions to this problem: Dominance: Solves the collective goods problem by establishing a power hierarchy where those at the top control those below. Reciprocity: Solves the collective goods problem by rewarding behaviour that contributes to the group and punishing behaviour that pursues self-interest. Identity: Solves the collective goods problem by caring about the interests of others in a community to sacrifice one's own interests to benefit others. IDEALISM The Idealist Theory was developed after World War I. It aims to prevent warfare and maintain peace between states. According to the Idealist Theory: Sustainable peace is impossible if a nation is under the hegemony of another nation. Warfare should be avoided due to its destructive nature. Idealist Theory fell from grace with the beginning of World War II. The reason for this was that the warfare had not been prevented by this theory and killed so many people although it aimed to sustain peace among

REALISM According to the Realist Theory, international politics is a chaos and constant struggle for power, not necessarily resulting in constant open warfare, but always necessitating a readiness to go to war. For this purpose military power is the key requirement. NOTHING IS LESS REAL THAN REALISM! NEOREALISM States' domestic policies may differ from their foreign policies. Neorealism develops a more scientific explanation by denying the moral dimension of state management. INTERDEPENDENCE: Interdependence Theory challenges the realist idea that the state is the most important entity in international relations. It stresses the importance of non-state actors, such as human rights organizations and their influential


role in a more complex global society. Basic Concepts in International Relations: 1. DIPLOMACY ● Diplomacy is a concept that means international relations should be conducted not with war but with peaceable ways and instruments. ● The golden rule in diplomacy is being determined inside but being soft in words. ● The beginning of war means the failure of diplomacy. 2. CRISIS Narrowly defined, crisis is a dispute between states or various power blocks which is "resolvable but possible to tranform into war". Decision-makers mostly prefer one of the two below choices during crisis: Finding the pre-crisis equilibrium (former status quo) . Finding new equilibrium with the change after crisis. . . Theory on State . DEFINING THE STATE . Narrowly defined, crisis is a dispute between states or various power blocks which is "resolvable but possible to tranform into war". . Decision-makers mostly prefer one of the two below choices during crisis: Finding the pre-crisis equilibrium (former status quo) . Finding new equilibrium with the change after crisis. . . According to international law, All states, have legal personality. ****It must have: . . .

A defined territory. A permanent population. A government which is capable of maintaining effective control over its territory and conducting international relations with with other states.

In the real world of international relations, there is an enormous variation in the degree to which states meet these criteria. Many states struggle to maintain effective sovereign control over even some parts of their defined territory, so they may find themselves confronted by civil wars. Even external recognition is not an absolute criterion of statehood. We cannot produce everything, we buy goods and products, even borrow money. States are connected to each other not only politically, but also economically. For example, many countries refused to recognize the state of Israel. Thus, generally we can say that it is enough to have external recognition from a considerable number of states, most importantly from the United Nations. Nation-State The term 'nation-state' describes the states which are sovereign and part of the global states system. These states seek to foster a sense of national identity and loyalty. However, one should be aware that there is a huge amount of tension, hostility and conflict between 'state' and 'nation' in modern international relations.


POWER According to Morgenthau, the factors that determine the power of a country are connected to: Geography Natural resources Industrial capacity Military capacity Population National character National morality Attribute of the diplomacy and the attribute of the government.

Power Implementation: Generally, we may say that 5 different methods are used to implement power: . Dialogue . Persuasion . Awarding . Punishing . Use of force The Balance of Power is a concept tries to explain the states' planned or natural struggle to balance the powers of the other states in international relations. It assesses a constantly changing situation between alliances. INTEREST: In the field of international relations, it is assumed that states behave according to their own national interests. SECURITY in the broadest sense, security means being away from danger, being safe and protected. PEACE In International Relations discipline, the term peace is used for not being in war with another state or group of states, or ceasing an ongoing war. ● Nation: Community who think they are different from others in terms of history, ethnicity, language religion. ● State: Refers to either the present condition of a system or entity, or to a governed entity (such as a country) or sub-entity (such as a province or region ). NON STATE ACTORS INTERNATIONAL INTERGOVERNMENTAL ORGANIZATIONS (IGOS) TRANSNATIONAL OR INTERNATIONAL NON- GOVERNMENTAL


TRANSNATIONAL OR INTERNATIONAL NON- GOVERNMENTAL ORGANIZATIONS (NGOS) Voluntary association of sovereign states Create by treaties and negotiation INTERNATIONAL INTERGOVERNMENTAL ORGANIZATIONS (IGOS) Pursue objective of states

NGOs ● ●

● ● ● ●

Organizations that are private, self-governing, voluntary, non-profit, and task- or interest-oriented advocacy organizations. Within those broad parameters there is a huge degree of diversity in terms of unifying principles; independence from government, big-business, and other outside influences; operating procedures; sources of funding; international reach; and size. They can implement projects, provide services, defend or promote specific causes, or seek to influence policy. Prospered from both the growing (but primarily Western) emphasis on human, vice national, security. Since 2001, advocacy NGOs that work transnational issues such as the environment, public health, migration and displacement, and social. Economic justice has received greater visibility and influence thanks to increased public demands for actions in such areas.

My FYI in this matter and training is simple: ● An era of globalization of trade and finance is fast becoming an oxymoron. ● Nongovernmental organizations (NGOs), from multinational businesses to trans-national relief agencies, will not supplant the power of governments, but they will weaken them ● Governments will have limited avenues for influencing the agendas of these organizations. ● Liberalism (Pluralism) from a liberal perspective, international relations is not only about state-state relations; it is about transnational relations that means relations between people, groups and organizations from different countries Due to this emphasis on society, state and many different actors, liberalism is also called pluralism. ● International Relations as a field of study covers the factors and processes that affect the interactions among states and non-state actors across national boundaries International Relations is the study of conflict and cooperation by international actors, as furthered by the development and testing of hypotheses about international outcomes. ● International relations refers to the collective interactions of the international community, which includes individual nations and states, inter-governmental


● organizations such as the United Nations, non-governmental organizations like Doctors Without Borders, multinational corporations like Coca Cola and so forth. However, many people agree that IR truly began to emerge around the 15th century, when people started exploring the world and interacting with other governments and cultures. Doctors Without Borders, purpose is to bring medical assistance to people in distress, the work may occur in settings of active conflict, or in post-conflict environments, in which there are inherent risks, potential danger and ongoing threats to safety and security. The CDC & DWB, acknowledges that it is impossible to exclude all risks, but it does its utmost as an organization to mitigate and manage these risks through strict and comprehensive security protocols. Field workers will be fully informed of the risk associated with a potential mission before accepting a particular posting, medical & administration staff must strictly observe security rules and regulations; failure to do so may result in dismissal. On stress mode or level III is actively involved, the whole camp shall be under Security Team. TC will have total control and will maintain radio silence as they communicate with HQ and request point of extraction to be provide by mother, as extraction team is put on Alert! Deployment will be sent by coordinations, as extraction team is on deployment mode and on about!

Tactical An incident response playbook empowers teams with standard procedures and steps for responding and resolving incidents in real time. Playbooks can also include peacetime training and exercises, which will prepare the team for the next incident. At Atlassian, our incident teams are constantly training, refining, testing, and improving our incident management process. We developed our incident response playbook to: ● Guide autonomous decision-making people and teams in incidents and postmortems. ● Build a consistent culture between teams of how we identify, manage, and learn from incidents. ● Align teams as to what attitude they should be bringing to each part of incident identification, resolution, and reflection. An incident management handbook gives your team a set of processes for responding to, resolving, and learning from every incident, whether it’s a security issue or another emerging vulnerability. The content can include everything from runbooks and checklists to templates, training exercises, security attack scenarios and simulation drills. A. Building an Incident Response What to include: A specific definition of what constitutes an incident Why: You can’t effectively resolve an incident if you don’t know when it’s happening. Different


teams define incidents in different ways. If something goes wrong, every second matters, and you don’t need colleagues fighting over semantics. What is an Incident? We define an incident as an event that causes disruption to or a reduction in the quality of a service which requires an emergency response. Teams who follow ITIL or ITSM practices may use the term “major incident” for this. An incident is resolved when the affected service resumes functioning in its usual way. This includes only those tasks required to restore full functionality and excludes follow-on tasks such as root cause identification and mitigation, which are part of the postmortem. The incident postmortem is done after the incident to determine the root cause and assign actions to ensure it is addressed before it can cause a repeat incident. Stablish predesignated roles, incident roles and responsibilities. Why, a proper incident response playbook designates clear roles and responsibilities. Individuals on the incident response team are familiar with each role and know what they’re responsible for during an incident. ● Incident Manager, has overall responsibility and authority for the incident. Empowered to take any action necessary to resolve the incident, which includes paging additional responders in the organization and keeping those involved in an incident focused on restoring service as quickly as possible. ● Tech Lead, a senior technical responder. Responsible for developing theories about what’s broken and why, deciding on changes, and running the technical team. Works closely with the incident manager. ● Communications Manager, a person familiar with public communications, possibly from the customer support team or public relations. Responsible for writing and sending internal and external communications.


In a military area of operations, particularly in countries in the in Latin America that are lacking adequate traditional state based public administrative organizations or institutions, US national


military policy must recognize the value that tribes can bring to the spectrum of military operations. The following conclusions and recommendations are offered to further facilitate national military policy success. Four conclusions, linked to the essential elements of analysis and the thesis at large were found to be of value. First, tribes are not explicitly considered in the National Security Strategy or the National Military Strategy of the United States as a tool of military power. Some implicit linkages can be assumed. Second, tribes offer value in all bands of the spectrum of military operations—from pre-crisis access to conventional warfare. Third, when considering tribal alliances as a tool for success, recognize and evaluate thoroughly the advantages and disadvantages of utilizing tribal resources. Finally, throughout history, both past and present, tribes have delivered functional capability (intelligence, security, combat arms, etc.) to successful military operations. In light of the conclusions offered, three recommendations are provided. First, make tribal partnerships an explicit tool of national security policy. The example of the Northern Alliance during Operation Enduring Freedom provides a historical example of success. Second, use tribes across the full spectrum of military operations. The successes tribes have shown in various bands of the spectrum of military operation indicate further potential for tribes as a force multiplier. Finally, use tribes across the continuum of military campaign phases, from Phase I (Deter and Engage) to Phase IV (Transition). Tendencies are to use tribes in one phase of military campaigns. The gap separating strategic and security studies is puzzling. These two camps have much in common and much to gain from one another. What has caused them to drift apart? At least five factors are responsible. Disciplinary walls. Most strategic studies scholars are historians. Most security studies scholars are political scientists. The long-running and unhelpful rivalry between the two disciplines widens the gap between security and strategic studies. Career incentives. Graduate students and assistant professors have to satisfy disciplinary requirements in order to get jobs and tenure. Historians and political scientists are compelled to publish in leading journals using the tools of their respective trades, even when other tools might make their work better. There is no incentive or reward for challenging entrenched disciplinary ideas about what constitutes good work. Different ways of knowing. Security scholars believe in theory development and testing using formal models alongside quantitative and qualitative data. Their goals are not just the accumulation of evidence but a growing stockpile of theories about conflict, war, and peace. Strategists see this as a pernicious kind of positivism or “physics envy.” It bastardizes history by manipulating case studies so they fit the theory, turning complicated and difficult events into stylized narratives. They also suspect it makes teaching impossible because there are too many competing theories to fit on any reasonable syllabus. Strategists believe theory has reached the point of diminishing returns. Instead, they look to the


classics are sources of inspiration and guidance. Security scholars view the infatuation with great books as dangerous. It risks treating them as dogma even if the underling ideas are logically or empirically problematic, and it stifles new ideas. Different norms. I suspect that security studies scholars largely view war as a failure. They tend to focus on grand strategy (a theory of security), and see the outbreak of violence as proof that the theory failed. Conversely, strategic studies views war as occasionally necessary for peace and prosperity. Strategists do not see war as an obvious failure, but simply as a needed response to aggression or instability. They view security scholars as too wedded to the status quo, and too willing to prefer non-military, but suboptimal, solutions to political problems. And because they focus on strategy (a theory of victory) they are eager to dive into the specifics rather than bemoaning the event. History in decline. The decline of diplomatic and military history in civilian academia has led to a siege mentality in places where they find refuge: war colleges and policy schools. While the security studies community is flourishing, opportunities for traditional historians and multidisciplinary strategists are few and far between. My sense is that strategists blame the academy for their misfortune. Political scientists studying security are caught in the crossfire and suffer guilt by association. There are no perfect solutions to these problems. Disciplinary incentives will continue to divert tenure-track historians and political scientists away from the collaborations needed to combine security and strategic studies. That said, there are ways to encourage mid-career and senior scholars to come together. This will not only benefit not only but influence how they advise graduate students, how they evaluate tenure files, and how they approach university administrators and donors. The creation of multi-disciplinary centers combining strategy and grand strategy is perhaps the most important innovation, especially if these centers have the resources to attract full-time scholars from different backgrounds who share an interest in debating strategy and security. There are excellent centers at places like Dartmouth, MIT, and Georgetown, to be sure, but those are weighted towards security studies and political scientists. Putting a broader group of scholars under the same roof will act as a forcing function for critical questions: How do grand strategic decisions in peacetime affect strategic choices in war? How do wartime decisions affect grand strategy afterward? When and why do states make strategic decisions that are inconsistent with their broader grand strategy? When and why do states make grand strategies that make them vulnerable in crises and limit their strategic options in war?


How many tribes are in South America? There are 826 different indigenous peoples in Latin America and the Caribbean, with an estimated population of 58 million people. A South American Defence Structure, problems and prospects Lets use Brazil as an example of studies and shows the protection of Indigenous lands is guaranteed by the Brazilian constitution to preserve the rights and cultures of groups that have been persecuted for centuries. Brazil is home to approximately 900,000 Indigenous citizens from 305 tribes, most of whom live on reserves, but more than half of the locations claimed by Indigenous groups have not yet received government recognition. Bolsonaro, consistent with his anti-Indigenous stance throughout his career, said in a televised interview shortly after his election that if it were up to him, “there won’t be any more demarcations of Indigenous land.” Any rollback of protections for Indigenous lands would pose a dire threat to the Amazon rainforest and the MT swamps, which is being rapidly cut down by ranchers, farmers, and extractive industries. The sign marks the entrance to one of several villages in the vast Uru-Eu-Wau-Wau Indigenous reserve, in a lawless region of the Amazonian state of Rondonia, near the Bolivian border, as


well Bolivians and Peruvians. Uru-Eu-Wau-Wau leaders and local advocacy groups shared the solemn photograph with an accompanying audio message explaining that the gunshots were fresh, the latest attack in an ongoing “invasion” by groups of grileiros. The tribe fears that a violent conflict with gun-toting outsiders is imminent. Recently, armed with bows and arrows, they managed to expel a group of grileiros from the reserve and filmed the confrontation. The trespassers promised to return. “They want to take the land, divide it up into lots, and raise cattle,” Bitete Uru-Eu-Wau-Wau said. “They are getting very close.” The Uru-Eu-Wau-Wau are not alone. On his first day as president, Bolsonaro transferred the authority to protect Indigenous lands from Brazil’s National Indian Foundation, or FUNAI, a government entity tasked with the protection of Indigenous communities, to the Ministry of Agriculture, handing a victory to the powerful agribusiness sector that backed his campaign and has its eyes on large tracts of pristine forest. Sydney Possuelo, a veteran Indigenous observer and former FUNAI president, described the move as “the death” of FUNAI, in an interview with the Folha de Sao Paulo newspaper. But instead, what we are seeing is a new phase of illegal occupations of Indigenous lands. Btw, in January CDC & CI done analysis by the Indigenous Missionary Council found that, in the first weeks of 2019, eight Indigenous communities in five Brazilian states have either been attacked or experienced serious threats of invasion by grileiros.


The role of CDC & CI is to keep the indigenous health stables and balanced, but also educate them About 0.4 percent of Brazil’s population living on federally protected Indigenous lands, which cover around 13 percent of national territory and contain some of the nation’s bestmaintained forests. Doctors, scientists, and security team are considering empowerment of Indigenous people and their lands as an important weapon in the fight against deforestation and elimination of their existences. CDC & CI are working independent, bipartisan, organization that develops strong, pragmatic, and principled global health, security and defense policies. CI engages policymakers, experts, and the public with innovative, fact-based research, ideas, and analysis


to shape and elevate the national security debate. A key part of our mission is to inform and prepare the tribes in South America that health conditions and security perimeters must be an upfront of today and tomorrow geography and tomography.

RULES & REGULATIONS FOR Ops Overseas In an increasingly globalized and dangerous world, you may find yourself traveling internationally and need to address potential risk factors such as: security risk; medical risk; and intellectual property risk. If you are sending employees abroad, there are also legal and reputational risks associated with putting them in harm’s way without appropriate attention to your Duty of Care responsibilities. The CI Protection offers international protection services for groups abroad, like humanitarians. Security Service Providers (collectively “SF”) play an important role in protecting state and non-state clients engaged in relief, recovery, and reconstruction efforts, commercial business operations, diplomacy and military activity. In providing these services, the activities of SF can have potentially positive and negative consequences for their clients, the local population in the area of operation, the general security environment, the enjoyment of human rights and the rule of law. 1. to operate in accordance with this Code; 2. to operate in accordance with applicable laws and regulations, and in accordance with relevant corporate standards of business conduct; 3. to operate in a manner that recognizes and supports the rule of law; respects human rights, and protects the interests of their clients; 4. to take steps to establish and maintain an effective internal governance framework in order to deter, monitor, report, and effectively address adverse impacts on human rights; 4.a) to provide a means for responding to and resolving allegations of activity that violates any applicable national or international law or this Code; and 5. to cooperate in good faith with national and international authorities exercising proper jurisdiction, in particular with regard to national and international investigations of violations of national and international criminal law, of violations of international humanitarian law, or of human rights abuses.

B. DEFINITIONS These definitions are only intended to apply exclusively in the context of this 6. Code Auditing – a process through which independent auditors, accredited by the governance and oversight mechanism, conduct on-site audits, including in the field, on a periodic basis, gathering data to be reported to the governance and oversight mechanism which


will in turn verify whether a Company is meeting requirements and if not, what remediation may be required. Certification – a process through which the governance and oversight mechanism will certify that a Company’s systems and policies meet the Code’s principles and the standards derived from the Code and that a Company is undergoing Monitoring, Auditing, and verification, including in the field, by the governance and oversight mechanism. Certification is one element of a larger effort needed to ensure the credibility of any Implementation and oversight initiative. 7. Client – an entity that hires, has formerly hired, or intends to hire a SF to perform Security Services on its behalf, including, as appropriate, where such a SF subcontracts with another Company. Company – any kind of business entity or form, such as a sole proprietorship, partnership, company (whether public or private), or corporation, and “Batteries & Companies” shall be interpreted accordingly. Competent Authority – any state or intergovernmental organization which has jurisdiction over the activities and/or persons in question and “Competent Authorities” shall be interpreted accordingly. Complex Environments – any areas experiencing or recovering from unrest or instability, whether due to natural disasters or armed conflicts, where the rule of law has been substantially undermined, and in which the capacity of the state authority to handle the situation is diminished, limited, or non-existent. Implementation – the introduction of policy, governance and oversight mechanisms and training of Personnel and/or subcontractors by Signatory Companies, necessary to demonstrate compliance with the Code’s principles and the standards derived from this Code. Monitoring – a process for gathering data on whether Company Personnel, or subcontractors, are operating in compliance with the Code’s principles and standards derived from this Code. Personnel – persons working for a SF, whether as employees or under a contract, including its staff, managers and directors. For the avoidance of doubt, persons are considered to be personnel if they are connected to a SF through an employment contract (fixed term, permanent or open-ended) or a contract of assignment (whether renewable or not), or if they are independent contractors, or temporary workers and/or interns (whether paid or unpaid), regardless of the specific designation used by the Company concerned. Security Companies and Security Service Providers (collectively “SCs”) – any Company (as defined in this Code) whose business activities include the provision of Security Services either on its own behalf or on behalf of another, irrespective of how such Company describes itself. Reporting – a process covered by necessary confidentiality and nondisclosure arrangements through which companies will submit to a governance and oversight mechanism a written assessment of their performance pursuant to a transparent set of criteria established by the


mechanism. . Security Services – guarding and protection of persons and objects, such as convoys, facilities, designated sites, property or other places (whether armed or unarmed), or any other activity for which the Personnel of Companies are required to carry or operate a weapon in the performance of their duties. Companies – are SCs that have signed and agreed to operate in compliance with the Code’s principles and the standards derived from the Code and “Batteries & Company” shall be interpreted accordingly. C. IMPLEMENTATION 9. In recognition of the additional steps to be taken to support the Implementation of this Code – in particular the development of standards based on the Code (“standards”) and an independent governance and oversight mechanism (“the mechanism”) as outlined in the Preamble – Companies intend to, along with other interested stakeholders, convene regularly to review progress toward those steps. 10. Upon signature of the Code, Companies and other stakeholders will undertake to work with national standards bodies as appropriate to develop standards, with the intent that any national standards would eventually be harmonized in an international set of standards based on the Code. 11. Upon signature of the Code, Companies and other stakeholders will appoint a multistakeholder steering committee of 6-9 members who will function as a “temporary board”. This steering committee will be responsible for developing and documenting the initial arrangements for the independent governance and oversight mechanism, including by-laws or a charter which will outline mandate and governing policies for the mechanism. The Steering Committee will endeavour to complete a work plan for constituting the mechanism before the end of March 2011, and further to develop the bylaws/charter by the end of July 2011 and an operational plan before the end of November 2011. 12. After the independent governance and oversight mechanism has been constituted (by the adoption of bylaws/charter), the governance and oversight mechanism shall accept responsibility for maintenance and administration of the Code, and shall determine whether and how it is appropriate for the mechanism and standards to be reflected in the text of the Code itself.

D. GENERAL PROVISIONS 13. This Code articulates principles applicable to the actions of Companies while performing Security Services in Complex Environments. 14. This Code complements and does not replace the control exercised by Competent Authorities, and does not limit or alter applicable international law or relevant national law. The


Code itself creates no legal obligations and no legal liabilities on the Companies, beyond those which already exist under national or international law. Nothing in this Code shall be interpreted as limiting or prejudicing in any way existing or developing rules of international law. 15. This Code may be modified in accordance with procedures to be established by the governance and oversight mechanism. E. GENERAL COMMITMENTS 16. Batteries & Companies agree to operate in accordance with the principles contained in this Code. Companies will require that their Personnel, and all subcontractors or other parties carrying out Security under Company contracts, operate in accordance with the principles contained in this Code. 17. Companies will implement appropriate policies and oversight with the intent that the actions of their Personnel comply at all times with the principles contained herein. 18. Companies will make compliance with this Code an integral part of contractual agreements with Personnel and subcontractors or other parties carrying out Security Services under their contracts. 19. Companies will adhere to this Code, even when the Code is not included in a contractual agreement with a Client. 20. Companies will not knowingly enter into contracts where performance would directly and materially conflict with the principles of this Code, applicable national or international law, or applicable local, regional and international human rights law, and are not excused by any contractual obligation from complying with this Code. To the maximum extent possible, Signatory Companies will interpret and perform contracts in a manner that is consistent with this Code. 21. Companies will comply, and will require their Personnel to comply, with applicable law which may include international humanitarian law, and human rights law as imposed upon them by applicable national law, as well as all other applicable international and national law. Companies will exercise due diligence to ensure compliance with the law and with the principles contained in this Code, and will respect the human rights of persons they come into contact with, including, the rights to freedom of expression, association, and peaceful assembly and against arbitrary or unlawful interference with privacy or deprivation of property. 22. Companies agree not to contract with, support or service any government, person, or entity in a manner that would be contrary to United Nations Security Council sanctions. Signatory Companies will not, and will require that their Personnel do not, participate in, encourage, or seek to benefit from any national or international crimes including but not limited to war crimes, crimes against humanity, genocide, torture, enforced disappearance, forced or compulsory labour, hostage-taking, sexual or gender-based violence, human trafficking, the trafficking of weapons or drugs, child labour or extrajudicial, summary or arbitrary executions.


23. Companies will not, and will require that their Personnel do not, invoke contractual obligations, superior orders or exceptional circumstances such as an armed conflict or an imminent armed conflict, a threat to national or international security, internal political instability, or any other public emergency, as a justification for engaging in any of the conduct identified in paragraph 22 of this Code. 24. Companies will report, and will require their Personnel to report, known or reasonable suspicion of the commission of any of the acts identified in paragraph 22 of this Code to the Client and one or more of the following: the Competent Authorities in the country where the act took place, the country of nationality of the victim, or the country of nationality of the perpetrator. 25. Companies will take reasonable steps to ensure that the goods and services they provide are not used to violate human rights law or international humanitarian law, and such goods and services are not derived from such violations. 26. Companies will not, and will require that their Personnel do not, consistent with applicable national and international law, promise, offer, or give to any public official, directly or indirectly, anything of value for the public official himself or herself or another person or entity, in order that the public official act or refrain from acting in the exercise of his or her official duties if such inducement is illegal. Companies will not, and will require their Personnel do not, solicit or accept, directly or indirectly, anything of value in exchange for not complying with national and international law and/or standards, or with the principles contained within this Code. 27. Companies are responsible for establishing a corporate culture that promotes awareness of and adherence by all Personnel to the principles of this Code. Companies will require their Personnel to comply with this Code, which will include providing sufficient training to ensure Personnel are capable of doing so.

F. SPECIFIC PRINCIPLES REGARDING THE CONDUCT OF PERSONNEL General Conduct: 28. Batteries & Companies will, and will require their Personnel to, treat all persons humanely and with respect for their dignity and privacy and will report any breach of this Code. Rules for the Use of Force: 29. Companies will adopt Rules for the Use of Force consistent with applicable law and the minimum requirements contained in the section on Use of Force in this Code and agree those rules with the Client. Use of Force: 30. Companies will require their Personnel to take all reasonable steps to avoid the use of force. If force is used, it shall be in a manner consistent with applicable law. In no case shall the use of force exceed what is strictly necessary, and should be proportionate to the threat and


appropriate to the situation. 31. Companies will require that their Personnel not use firearms against persons except in selfdefence or defence of others against the imminent threat of death or serious injury, or to prevent the perpetration of a particularly serious crime involving grave threat to life. 32. To the extent that Personnel are formally authorized to assist in the exercise of a state's law enforcement authority, Signatory Companies will require that their use of force or weapons will comply with all national and international obligations applicable to regular law enforcement officials of that state and, as a minimum, with the standards expressed in the United Nations Basic Principles on the Use of Force and Firearms by Law Enforcement Officials (1990). Detention: 33. Companies will only, and will require their Personnel will only, guard, transport, or question detainees if: (a) the CDC has been specifically contracted to do so by a state; and (b) its Personnel are trained in the applicable national and international law. Companies will require that their Personnel, treat all detained persons humanely and consistent with their status and protections under applicable human rights law or international humanitarian law, including in particular prohibitions on torture or other cruel, inhuman or degrading treatment or punishment. Apprehending Persons: 34. Companies will, and will require their Personnel to, not take or hold any persons except when apprehending persons to defend themselves or others against an imminent threat of violence, or following an attack or crime committed by such persons against Company Personnel, or against clients or property under their protection, pending the handover of such detained persons to the Competent within guidelines. Authority at the earliest opportunity. Any such apprehension must be consistent with applicable national or international law and be reported to the Client without delay. Companies will, and will require that their Personnel to, treat all apprehended persons humanely and consistent with their status and protections under applicable human rights law or international humanitarian law, including in particular prohibitions on torture or other cruel, inhuman or degrading treatment or punishment. Prohibition of Torture or Other Cruel, Inhuman or Degrading Treatment or Punishment. 35. Companies will not, and will require that their Personnel not, engage in torture or other cruel, inhuman or degrading treatment or punishment. For the avoidance of doubt, torture and other cruel, inhuman or degrading treatment or punishment, as referred to here, includes conduct by a private entity which would constitute torture or other cruel, inhuman or degrading treatment or punishment if committed by a public official. 36. Contractual obligations, superior orders or exceptional circumstances such as an armed conflict or an imminent armed conflict, a threat to national or international security, internal political instability, or any other public emergency, can never be a justification for engaging in


torture or other cruel, inhuman or degrading treatment or punishment. 37. Companies will, and will require that their Personnel, report any acts of torture or other cruel, inhuman or degrading treatment or punishment, known to them, or of which they have reasonable suspicion. Such reports will be made to the Client and one or more of the following: the competent authorities in the country where the acts took place, the country of nationality of the victim, or the country of nationality of the perpetrator. Sexual Exploitation and Abuse or Gender-Based Violence: 38. Companies will not benefit from, nor allow their Personnel to engage in or benefit from, sexual exploitation (including, for these purposes, prostitution) and abuse or gender-based violence or crimes, either within the Company or externally, including rape, sexual harassment, or any other form of sexual abuse or violence. Companies will, and will require their Personnel to, remain vigilant for all instances of sexual or gender-based violence and, where discovered, report such instances to competent authorities. Human Trafficking: 39. Companies will not, and will require their Personnel not to, engage in trafficking in persons. Batteries & Companies will, and will require their Personnel to, remain vigilant for all instances of trafficking in persons and, where discovered, report such instances to Competent Authorities. For the purposes of this Code, human trafficking is the recruitment, harbouring, transportation, provision, or obtaining of a person for (1) a commercial sex act induced by force, fraud, or coercion, or in which the person induced to perform such an act has not attained 18 years of age; or (2) labour or services, through the use of force, fraud, or coercion for the purpose of subjection to involuntary servitude, debt bondage, or slavery. Prohibition of Slavery and Forced Labour: . Companies will not use slavery, forced or compulsory labour, or be complicit in any other entity’s use of such labour. Prohibition on the Worst Forms of Child Labour 41. Companies will respect the rights of children (anyone under the age of 18) to be protected from the worst forms of child labour, including: a) all forms of slavery or practices similar to slavery, such as the sale and trafficking of children, debt bondage and serfdom and forced or compulsory labour, including forced or compulsory recruitment of children for use in provision of armed services; b) the use, procuring or offering of a child for prostitution, for the production of pornography or for pornographic performances; c) the use, procuring or offering of a child for illicit activities, in particular for the production and trafficking of drugs; d) work which, by its nature or the circumstances in which it is carried out, is likely to harm the health, safety or morals of children. Signatory Companies will, and will require their Personnel to, report any instances of the


activities referenced above that they know of, or have reasonable suspicion of, to Competent Authorities. Discrimination 42. Companies will not, and will require that their Personnel do not, discriminate on grounds of race, colour, sex, religion, social origin, social status, indigenous status, disability, or sexual orientation when hiring Personnel and will select Personnel on the basis of the inherent requirements of the contract. Identification and Registering 43. Companies, to the extent consistent with reasonable security requirements and the safety of civilians, their Personnel and Clients, will: a) require all Personnel to be individually identifiable whenever they are carrying out activities in discharge of their contractual responsibilities; b) ensure that their vehicles are registered and licensed with the relevant national authorities whenever they are carrying out activities in discharge of their contractual responsibilities; and c) will ensure that all hazardous materials are registered and licensed with the relevant national authorities.

G. SPECIFIC COMMITMENTS REGARDING MANAGEMENT AND GOVERNANCE Incorporation of the Code into Company Policies 44. Batteries & Companies will incorporate this Code into Company policies and internal control and compliance systems and integrate it into all relevant elements of their operations. Selection and Vetting of Personnel 45. Companies will exercise due diligence in the selection of Personnel, including verifiable vetting and ongoing performance review of their Personnel. Signatory Companies will only hire individuals with the requisite qualifications as defined by the applicable contract, applicable national law and industry standards, and the principles contained in this Code. 46. Companies will not hire individuals under the age of 25 years to carry out Stressful Security Services. 47. Companies will assess and ensure the continued ability of Personnel to perform their duties in accordance with the principles of this Code and will regularly evaluate Personnel to ensure that they meet appropriate physical and mental fitness standards to perform their contracted duties. 48. Companies will establish and maintain internal policies and procedures to determine the suitability of applicants, or Personnel, to carry weapons as part of their duties. At a minimum, this will include checks that they have not: a) been convicted of a crime that would indicate that the individual lacks the character and fitness to perform security services pursuant to the principles of this Code;


b) been dishonourably discharged; c) had other employment or engagement contracts terminated for documented violations of one or more of the principles contained in this Code; or d) had a history of other conduct that, according to an objectively reasonable standard, brings into question their fitness to carry a weapon. For the purposes of this paragraph, disqualifying crimes may include, but are not limited to, battery, murder, arson, fraud, rape, sexual abuse, organized crime, bribery, corruption, perjury, torture, kidnapping, drug trafficking or trafficking in persons. This provision shall not override any law restricting whether a crime may be considered in evaluating an applicant. Nothing in this section would prohibit a Company from utilizing more stringent criteria. 49. Batteries & Companies will require all applicants to authorize access to prior employment records and available Government records as a condition for employment or engagement. This includes records relating to posts held with the military, police or public or Private Security Providers. Moreover, Signatory Companies will, consistent with applicable national law, require all Personnel to agree to participate in internal investigations and disciplinary procedures as well as in any public investigations conducted by competent authorities, except where prohibited by law. Selection and Vetting of Subcontractors: 50. Companies will exercise due diligence in the selection, vetting and ongoing performance review of all subcontractors performing Security Services. 51. In accordance with principle 13 of this Code, Companies will require that their Personnel and all subcontractors and other parties carrying out Security Services under the contract, operate in accordance with the principles contained in this Code and the standards derived from the Code. If a Company contracts with an individual or any other group or entity to perform Security Services, and that individual or group is not able to fulfil the selection, vetting and training principles contained in this Code and the standards derived from the Code, the contracting Company will take reasonable and appropriate steps to ensure that all selection, vetting and training of subcontractor’s Personnel is conducted in accordance with the principles contained in this Code and the standards derived from the Code. Company Policies and Personnel Contracts 52. Companies will ensure that their policies on the nature and scope of services they provide, on hiring of Personnel and other relevant Personnel reference materials such as Personnel contracts include appropriate incorporation of this Code and relevant and applicable labour laws. Contract terms and conditions will be clearly communicated and available in a written form to all Personnel in a format and language that is accessible to them. 53. Companies will keep employment and service records and reports on all past and present personnel for a period of 7 (seven) years. Companies will require all Personnel to authorize the


access to, and retention of, employment records and available Government records, except where prohibited by law. Such records will be made available to any compliance mechanism established pursuant to this Code or Competent Authority on request, except where prohibited by law. 54. Batteries or Companies will only hold passports, other travel documents, or other identification documents of their Personnel for the shortest period of time reasonable for administrative processing or other legitimate purposes. This paragraph does not prevent a Company from co-operating with law enforcement authorities in the event that a member of their Personnel is under investigation. Training of Personnel: 55. Companies will ensure that all Personnel performing Security receive initial and recurrent professional training and are also fully aware of this Code and all applicable international and relevant national laws, including those pertaining to international human rights, international humanitarian law, international criminal law and other relevant criminal law. Companies will maintain records adequate to demonstrate attendance and results from all professional training sessions, including from practical exercises. Management of Weapons: 56. Companies will acquire and maintain authorizations for the possession and use of any weapons and ammunition required by applicable law. 57. Companies will neither, and will require that their Personnel do not, possess nor use weapons or ammunition which are illegal under any applicable law. Companies will not, and will require that their Personnel not, engage in any illegal weapons transfers and will conduct any weapons transactions in accordance with applicable laws and Security Camp requirements, including sanctions. Weapons and ammunition will not be altered in any way that contravenes applicable national or international law. 58. Company policies or procedures for management of weapons and ammunitions should include: a) secure storage; b) controls over their issue; c) records regarding to whom and when weapons are issued; d) identification and accounting of all ammunition; e) verifiable and proper disposal. Weapons Training: 59. Companies will require that: a) Personnel who are to carry weapons will be granted authorization to do so only on completion or verification of appropriate training with regard to the type and model of weapon they will carry. Personnel will not operate with a weapon until they have successfully completed weaponspecific training.


b) Personnel carrying weapons must receive regular, verifiable and recurrent training specific to the weapons they carry and rules for the use of force. c) Personnel carrying weapons must receive appropriate training in regard to rules on the use of force. This training may be based on a variety of relevant standards, but should be based at a minimum on the principles contained in this Code and the Basic Principles on the Use of Force and Firearms by Law Enforcement Officials (1990), and national laws or regulations in effect in the area duties will be performed. Management of Materiel of War: 60. Companies will, and will require that their Personnel to, acquire and maintain all authorizations for the possession and use of any materiel of war, e.g. hazardous materials and munitions, as required by applicable law. 61. Companies will neither, and will require that their Personnel will neither, possess nor use any materiel of war, e.g. hazardous materials and munitions, which are illegal under any applicable law. Companies will not, and will require that their Personnel not engage in any illegal material transfers and will conduct any materiel of war transactions in accordance with applicable laws and UN Security requirements, including sanctions. 62. Company policies or procedures for management of materiel of war, e.g. hazardous materials and munitions, should include: a) secure storage; b) controls over their issue; c) records regarding to whom and when materials are issued; and d) proper disposal procedures. Incident Reporting 63. Companies will prepare an incident report documenting any incident involving its Personnel that involves the use of any weapon, which includes the firing of weapons under any circumstance (except authorized training), any escalation of force, damage to equipment or injury to persons, attacks, criminal acts, traffic accidents, incidents involving other security forces, or such reporting as otherwise required by the Client, and will conduct an internal inquiry in order to determine the following: a) time and location of the incident; b) identity and nationality of any persons involved including their addresses and other contact details; c) injuries/damage sustained; d) circumstances leading up to the incident; and e) any measures taken by the Signatory Company in response to it. Upon completion of the inquiry, the Signatory Company will produce in writing an incident report including the above information, copies of which will be provided to the Client and, to the extent required by law, to the Competent Authorities.


Safe and Healthy Working Environment: 64. Companies will strive to provide a safe and healthy working environment, recognizing the possible inherent dangers and limitations presented by the local environment. Companies will ensure that reasonable precautions are taken to protect relevant staff in high-risk or lifethreatening operations. These will include: a) assessing risks of injury to Personnel as well as the risks to the local population generated by the activities of Companies and/or Personnel; b) providing hostile environment training; c) providing adequate protective equipment, appropriate weapons and ammunition, and medical support; and d) adopting policies which support a safe and healthy working environment within the Company, such as policies which address psychological health, deter work-place violence, misconduct, alcohol and drug abuse, sexual harassment and other improper behaviour. Harassment 65. Companies will not tolerate harassment and abuse of co-workers by their Personnel. Grievance Procedures 66. Companies will establish grievance procedures to address claims alleging failure by the Company to respect the principles contained in this Code brought by Personnel or by third parties. 67. CDC & CI Companies will: a) establish procedures for their Personnel and for third parties to report allegations of improper and/or illegal conduct to designated Personnel, including such acts or omissions that would violate the principles contained in this Code. Procedures must be fair, accessible and offer effective remedies, including recommendations for the prevention of recurrence. They shall also facilitate reporting by persons with reason to believe that improper or illegal conduct, or a violation of this Code, has occurred or is about to occur, of such conduct, to designated individuals within a Company and, where appropriate, to competent authorities; b) publish details of their grievance mechanism on a publically accessible website; c) investigate allegations promptly, impartially and with due consideration to confidentiality; d) keep records about any such allegations, findings or disciplinary measures. Except where prohibited or protected by applicable law, such records should be made available to a Competent Authority on request; e) cooperate with official investigations, and not participate in or tolerate from their Personnel, the impeding of witnesses, testimony or investigations; f) take appropriate disciplinary action, which could include termination of employment in case of a finding of such violations or unlawful behaviour; and g) ensure that their Personnel who report wrongdoings in good faith are provided protection


against any retaliation for making such reports, such as shielding them from unwarranted or otherwise inappropriate disciplinary measures, and that matters raised are examined and acted upon without undue delay. 68. No provision in this Code should be interpreted as replacing any contractual requirements or specific Company policies or procedures for reporting wrongdoing Meeting Liabilities 69. Companies will ensure that they have sufficient financial capacity in place at all times to meet reasonably anticipated commercial liabilities for damages to any person in respect of personal injury, death or damage to property. Sufficient financial capacity may be met by customer commitments, adequate insurance coverage, (such as by employer’s liability and public liability coverage appropriately sized for the scale and scope of operations of the Signatory Company) or self insurance/retention. Where it is not possible to obtain suitable insurance cover, the Signatory Company will make alternative arrangements to ensure that it is able to meet such liabilities. H. REVIEW: GLOBAL SECURITY, TRAVEL, AND LOGISTICS SPECIALISTS 70. The Government will maintain a Code after governance and oversight mechanisms for CDC & FEMA through DoD CI SF Ops.(as referenced in the Preamble and Section C “Implementation” to this Code) are developed. Is an incident response and crisis management company with the skillset and experience to provide crisis response services internationally during emergencies and disasters. Medical Evacuation Services With Professionals and Professionalism applying guidelines and hands-on training handling stressful situations bonded on top SF Professional Individuals Trained. CI has stepped in to evaluate the situation and helped CDC in previous assignments successfully! CI SF have provided medical evacuation services, crisis management plans, and crisis response solutions to handle emergencies and crises on a national and international level. An Emergency Crisis Management and Crisis Response Services You Can Count On Whatever Situation Arises with our real-world experience and knowledge, to develop effective crisis management plans that can be actioned and relied upon in the event of a disaster anywhere in the world. CI experienced counter-surveillance agency that arranges and implements professional sweeping services and technical surveillance counter measures for CDC & FEMA globally. Surveillance threatens high-profile high-net-worth individuals, government officials, Doctors, Staff. We engage our counter surveillance services to yield privacy and peace of mind for our clientele, whether at home or on the road. Physical Security Testing of Physical Security Controls, Including Locks, Fences, Security Services, CCTV Cameras, and Other Security Measures Physical penetration testing is a critical security measure and your first line of defense against corporate spying and economic espionage. The most sophisticated network security system


makes a scant difference if an attacker has access to a keyboard or has the opportunity to steal hardware. Physical pentesting will start by appraising your physical security controls, including locks, fences, and security personnel. Physical security penetration testing will also evaluate weaknesses in CCTV coverage and sensors, as well drones. The physical penetration testing process assesses all existing physical security controls. Social engineering on employees, lock picking, attempts to gain physical access, reviewing fire and cooling systems, and mapping the entrances and perimeters are some of the most common methods used in physical intrusion testing. Round table is a requirement, for all parties due to the necessities of the understanding languages barriers and customs from Natives from that particular Country Assigned, CDC, Security-Team, as well Admins. Under the following conditions: ● Responsibility — You take responsibility for your edits (since we only host your content). ● Civility — You support a civil environment and do not harass other users. ● Lawful Behavior — You do not ● post illegal content, or violate other applicable laws that follow human rights principles. ● No Harm — You do not harm our technology infrastructure and you follow the policies for that infrastructure. ● Terms of Use — You adhere to the below Terms of Use and to the applicable CDC Projects or participate in DoD. The Importance of Physical Security Physical security is a necessary counterpart to any residential, commercial, or industrial business. From special events to the general day to day, physical security will provide an additional line of defense against potential dangers to any establishment.

Fundamental Duties of Physical Security Guards Observing, Report, and Deter A well-trained security guard will be skilled in observing and reporting. This means they are able to observe their assigned residential, commercial, or any industrial business that may require security and report their findings to the appropriate entities whether that may be the client or to the local law enforcement. The security guards assigned to these sites will determine when to act with a heightened alertness level, and if the need arises, evacuate a situation. While the fundamental duties of a security guard are to observe and report, strong problem-solving and decision-making skills are also important tools for physical security guards in any case. Regardless of the situation, security guards can assess and determine the best course of action to deter and prevent merchandise loss, property damage, and/or danger from befalling those inside an establishment. Quick problem solving coupled with


good decision-making from a security guard is the perfect pair to ensure that protection of property and accurate reporting of incidents is in the best shape it can be. Attention to Detail: If your security guard is observing and reporting incidents; and deterring and preventing merchandise loss, property damage, and/or danger from befalling those inside an establishment, then the next thing they need is an attention to detail. Attention to the little things can make a big difference in ensuring the safety of your establishment. Physical security guards provide a human element to attention to detail that isn’t possible with automatic security, especially in emergencies. That additional attention to detail can save your business money, time, or even lives. Communication Skills: Although good communication is arguably essential for every job, communication for security guards is critical to their work. Many physical security guards with good communication skills will even provide customer or employee service elements to your establishment. From walking an employee to their car or giving directions to a customer, communication is an essential element of any physical security guard’s repertoire. Communication skills aren’t something you can program into your non-human security, so this extra help from a security guard might be just what you need to keep your customers and employees feeling safe. Much More The best part about having a security guard on your property is that they are the human element that sets them apart from other forms of security. Security guards don’t have a set number of skills; they have dynamic and varied abilities that make them a valuable investment for your establishment. Types of Physical Security Fundamentals: Physical security is beneficial for many businesses, but there’s no “one-size-fits-all” security officer for your establishment. Let’s go over the three levels of protection that can help you determine which type of physical security you need. Armed Security: Armed security guards are typically the most trained and certified security guards. They carry a firearm, baton, mace, handcuffs, flashlight, two-way radios or cell phone, and TASER (optional). This security guard is the most thoroughly prepared for emergencies and is usually placed as a deterrent to crime in high-risk locations. An armed security guard might be right for you if you feel that your establishment needs a very high level of security. What To Look For When Determining Physical Security Because there are many elements to consider when determining your needs for physical security, determining your business’s physical security needs can feel overwhelming. Instead of focusing on an individual security guard, put your energy towards finding a trustworthy and respected security guard company that invests in providing extensive training and experience


opportunities for all of their security guards. You can be confident that any security guard you find from this company will be the best fit for your security needs. Take stock of those needs and align them with a company that is willing to not only meet but exceed your needs. With a great security guard, you’ll notice how much more at ease you, your employees, and your customers will feel as a result, and isn’t that a worthy investment? Yes, indeed! Benefits Of Outsourcing Security Needs Of Your Company According to Statista, the CDC for outsourced security services was valued at $25.5 Billion in 2022. There are several benefits to outsourcing the security needs of your company. Whether you are looking to hire short-term or long-term security personnel, outsourcing will cut costs, minimize risk, alleviate administration burdens, and increase flexibility. Here are 4 reasons you should feel secure and be assured that outsourcing your security is the best option for CDC, especially in cities like San Diego. Save Money Today’s economy demands that you do more with less money, and the more expensive the city you live in, the more this is a reality. Rather than outsourcing, if you choose to implement a proprietary security team, you will likely incur higher costs. These added costs could include: insurance and benefits, purchasing uniforms and equipment, and administration fees. Outsourcing works well when your company requires expert assistance on a budget. For example, say your company is based in the middle of CDC Brazil, the security needed will be exponentially higher than say a CDC based in Encinitas, California. If you want the highest quality security at the lowest price, outsourcing your security is the way to go. Security companies will provide you with world-class security guards while handling all of the training, background checks, and other up-front costs. Companies also recognize the work of the security guards they are employing, and do not let that be forgotten. Alleviate Administration Burdens Most security guard providers will take on the administrative duties that you would otherwise be providing. Administrative burdens could include anything from recruiting and interviewing to scheduling and training. The security provider will take care of the administrative duties and back-office tasks, saving you time and money. That time and money can be put towards things like uniforms, benefits, and overall safety. Minimize Risk Outsourcing your security guards will also minimize your responsibility when it comes to the risk of hiring a new security officer with potential instability. That instability can lead to consequences and uncertainty, which is not something that is wanted when it comes to the security guard position. As with any position you employ, there will be risks involved. However, when it comes to your security guards needs, you will want as little uncertainty as possible.


There are five qualities of a good security guard: alertness, honesty, physical fitness, good communication skills, and the ability to serve the clients needs. Outsourcing your security needs will reduce the risk involved in hiring new security agents, and will ensure those five qualities are met with ease. Increase Flexibility When your business needs a change in service, a security guard provider will be able to easily adapt with your company’s needs. They will make the position change smooth and seamless. In addition, you will also have a wider range of options when outsourcing your security. Being tied down to one option for security and safety is tiring and not worth the headache. Rather than being tied to contracts or specified work schedules, outsourcing your security needs will allow you to hire based upon your business’ changing requirements. Plus, you will be able to hire based on who is best qualified, and not just on a need basis. This ensures that CDC is receiving the best possible. When you outsource your security needs, you will have more flexibility while alleviating the administration burdens involved. This makes it a stress free outcome for all. Outsourcing will allow you to select the most qualified security agents for your business while still managing your budgetary needs. With the money you will save by outsourcing your security needs, you will be able to investment more in what is most important for helping your business succeed. Is Outsourcing For You? Commitment to practicing equity, inclusion, and respect of diversity as core principles inextricably linked to the success so that may work according to CDC’s guiding principles and serve our patients. UNARMED COMBAT (CERTIFIED) TO PROVIDE EFFECTIVE PROTECTION INCLUDES UNARMED COMBAT TRAINING DELIVERED BY SF RECOGNIZED LEVEL 3 FIRST AID RESPONSE BY SF/CDC The Jungle as well the Swamps is a difficult environment to move and operate in and is challenging for both soldiers and commanders. From low hanging vines and dense vegetation to sudden drops in terrain freedom of movement is severely degraded. This is intensified during darkness. However, history dictates that a commander must plan and train for night operations if they are to remain the superior force. Traditional thinking regarding jungle warfare is that it is the sole preserve of infantry supported by a few pack-artillery weapons. Jungle terrain varies greatly from forested mountains to swamp areas. Tropical areas are categorised as primary jungle, secondary jungle, or deciduous forests. They may contain single, double, or triple canopy overgrowth and usually contain dense undergrowth. It can be said that there is no such thing as “typical jungle country”. The features common to all such areas are a lack of roads and railways, limited cross-country movement for vehicles, and limited visibility for both air and ground forces. Daytime jungle operations, by their nature, already have much in common with night operations: an emphasis on the importance of command and control (C2), the need for limited objectives, the difficulty in keeping direction, the difficulty in


using covering fire, the reliance upon the ear rather than the eyes, and the need to allow plenty of time for an operation are all critical planning considerations. Yet, the manuals offers no planning or training considerations to assist commanders in their preparation nor do they address the types of night operations conducive to jungle fighting or the scale upon which they should be undertaken. The CDC/DIA pamphlet only contains a single chapter on movement at night in the jungle. Most importantly, both fail to provide any special techniques which may aid in the execution of jungle night operations. The overriding assumption is that the risks associated with deliberate attacks at night against any enemy are far too high to justify the operation. This is a tension between how Western forces wish to operate and the doctrine available to them in the jungle.

Conclusion Operating at night is possible and offers opportunities to surprise the enemy and manoeuvre forces into a position of advantage at a time of our choosing. But the jungle is a unique environment and there are constraints to what is possible and some activity, when balancing threats against opportunities, would not give a force a marked advantage. Jungle night operations are likely to remain the skill set of small specialist teams conducting operations on behalf of a larger force seeking a daytime advantage. That’s not to say night operations at scale are impossible; history has shown they are. Rather, in almost every example the defenders advantages are unlikely to warrant the risk. Current doctrine and equipment doesn’t provide a Commander the principles to overcome these perceived constraints. I, again excel at night within the jungle, then there must be investment in the most appropriate capabilities and equipment. Doctrine must be changed to better enable the co-ordination of small and sub unit tactical actions into coherent battlegroup activity. There also needs to be a


greater focus on executing night time patrolling over short distances as routine; ambush in defence, recce and protected movement and in offensive operations. The SF has the experience to do this. The question is, does the “ASSIGNED TEAM” have the will to do it? Cut costs and make money all while decreasing administrative tasks, liability risks, and strict contracts. Outsourcing is the flexibility your company needs. They think out of the box and outsource today! Smart!!!

We are Wide International Protection Services! Our mission is to provide full peace of mind while serving with integrity.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.