Hostage Incident Management
Total Page:16
File Type:pdf, Size:1020Kb
HOSTAGE INCIDENT MANAGEMENT: PREPAREDNESS AND RESPONSE OF INTERNATIONAL NON-GOVERNMENTAL ORGANISATIONS K.E. LAUVIK 2014 HOSTAGE INCIDENT MANAGEMENT: PREPAREDNESS AND RESPONSE OF INTERNATIONAL NON-GOVERNMENTAL ORGANISATIONS KJELL E. LAUVIK Submitted in fulfilment of the requirements for the Doctor of Philosophy (DPhil) in Conflict Management at the Faculty of Arts, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa January 2014 SUPERVISOR: DR. LYN SNODGRASS CO-SUPERVISOR: PROF. THOKO MAYEKISO i DEPARTMENT OF ACADEMIC ADMINISTRATION EXAMINATION SECTION SUMMERSTRAND NORTH CAMPUS PO Box 77000 Nelson Mandela Metropolitan University Port Elizabeth 6013 Enquiries: Postgraduate Examination Officer DECLARATION BY CANDIDATE NAME: KJELL ERIK LAUVIK STUDENT NUMBER: S211183695 QUALIFICATION: DOCTOR OF PHILOSOPHY (DPHIL) TITLE OF THESIS: HOSTAGE INCIDENT MANAGEMENT: PREPAREDNESS AND RESPONSE OF INTERNATIONAL NON-GOVERNMENTAL ORGANISATIONS DECLARATION: In accordance with Rule G4.6.3, I hereby declare that the above-mentioned treatise/ dissertation/ thesis is my own work and that it has not previously been submitted for assessment to another University or for another qualification. SIGNATURE: DATE: 09 January 2014 ii Contents LIST OF TABLES ........................................................................................................................... viii LIST OF MAPS ...............................................................................................................................ix LIST OF FIGURES ........................................................................................................................... x LIST OF APPENDICES .................................................................................................................... xii ACKNOWLEDGEMENTS ............................................................................................................... xiii Abstract...................................................................................................................................... xiv CHAPTER 1: INTRODUCTION ......................................................................................................... 1 1.1 Problem Statement ....................................................................................................... 4 1.2 Research Questions ....................................................................................................... 5 1.3 Statement of the Study’s Aims and Objectives ............................................................... 6 1.4 The Significance of Study ............................................................................................... 6 1.5 Definition of Key Terms ................................................................................................. 7 1.6 Summary statement .................................................................................................... 11 CHAPTER 2: INGO OPERATIONS AND SECURITY MECHANISMS .................................................... 13 2.1 Introduction ................................................................................................................ 13 2.2 Theoretical Framework ............................................................................................... 14 2.2.1 Conflict at macro and micro levels ....................................................................... 15 2.2.2 Crisis management frameworks ........................................................................... 15 2.2.3 Conflict resolution framework ............................................................................. 17 2.2.4 Negotiation framework ....................................................................................... 19 2.2.5 Emotions and hostage crisis ................................................................................. 21 2.2.6 The history of hostage negotiation ...................................................................... 23 2.2.7 Generic components of hostage negotiations ...................................................... 25 2.2.8 Conflict mapping ................................................................................................. 27 2.2.9 Negotiation strategies ......................................................................................... 30 2.2.10 Active listening .................................................................................................... 42 2.3 The INGO Community ................................................................................................. 43 2.4 NGO Guiding Principles and Codes of Conduct ............................................................ 45 2.5 NGOs as Actors ........................................................................................................... 46 2.6 Definition of NGOs ...................................................................................................... 46 2.7 Types of NGOs............................................................................................................. 47 2.8 NGOs’ Goals and Objectives ........................................................................................ 49 2.9 NGOs’ Organisational Structure and Budget ................................................................ 50 iii 2.10 INGO Operating Environments .................................................................................... 53 2.11 The UN Security Level System...................................................................................... 62 2.12 Operations in High Risk Zones ..................................................................................... 64 2.12.1 South America ..................................................................................................... 64 2.12.2 North Caucasus ................................................................................................... 65 2.12.3 Central and Southern Africa ................................................................................. 69 2.12.4 Middle East ......................................................................................................... 74 2.12.5 South Asia ........................................................................................................... 77 2.12.6 Southeast Asia ..................................................................................................... 79 2.13 NGO Security Handbooks ............................................................................................ 81 2.14 INGO Responses to Insecurity...................................................................................... 82 2.15 Interpreting Incident Data ........................................................................................... 83 2.16 Methods of Attack....................................................................................................... 85 2.17 Duty of Care ................................................................................................................ 87 2.18 Security Strategies....................................................................................................... 88 2.18.1 Acceptance .......................................................................................................... 89 2.18.2 Protection ........................................................................................................... 90 2.18.3 Deterrence .......................................................................................................... 91 2.19 Threat, Vulnerability, and Risk Assessment in the Context of INGO Security ................ 92 2.19.1 Security, risk and risk management ..................................................................... 92 2.19.2 The INGO community and ISO 31000 Risk Management ...................................... 94 2.19.3 INGO security cooperation................................................................................... 94 2.19.4 Exposure and vulnerabilities ................................................................................ 95 2.19.5 INGO security training ......................................................................................... 96 2.19.6 Being proactive .................................................................................................... 97 2.19.7 After-action analysis of critical incidents .............................................................. 98 2.20 Obstacles to Effective Security Management and Security Coordination ...................... 99 2.20.1 Impediments to security coordination ................................................................. 99 2.21 Conclusion ................................................................................................................ 102 CHAPTER 3: HOSTAGE MANAGEMENT ...................................................................................... 104 3.1 Introduction .............................................................................................................. 104 3.2 Definitions................................................................................................................. 104 3.2.1 Detention .......................................................................................................... 106 3.2.2 Abduction .......................................................................................................... 107 iv 3.2.3 Kidnapping .......................................................................................................