Abstract
Today, private military and security companies (PMSCs) can be found in various operational contexts and provide a wide range of services for public and private clients. It is increasingly common to see PMSCs patrolling borders, providing security in airports, protecting extractive industry projects, or providing military services in areas affected by conflict.
The demand for PMSCs’ services has grown considerably in the last decade, reflecting the process of privatization of security in areas in which it was traditionally provided by public security forces. The outsourcing of these services, which in many cases involve the use of force, has a vast impact on human rights.
This chapter delimits the presence and services provided by PMSCs at the international level and analyzes how their operations impact human rights. The author identifies and systematizes types of human rights’ violations according the services provided by PMSC and their operational contexts with the aim of providing more evidence and factors to open a public debate on which security areas should remain under the management of public institutions and which PMSC activities should be regulated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
See www.shockmonitor.org.
- 2.
Akkerman M (2016), pp. 41–42.
- 3.
The rise of the UK’s private security companies, BBC News, November 2, 2010. Available at http://www.bbc.com/news/business-11521579, last accessed on October 20, 2016.
- 4.
Buzatu A (2008), p. 7.
- 5.
See United Nations Office of the High Commissioner for Human Rights, Working Group on the Use of Mercenaries, Report to the 68th session of the General Assembly, UN Doc. A/68/339, August 20, 2013. Available at: http://www.un.org/en/ga/third/68/documentslist.shtml, last accessed on October 20, 2016.
- 6.
Fontaine R, Nagl J (2010), p. 11.
- 7.
DeWinter-Schmitt R. (ed.) (2013), p. 18.
- 8.
Armendáriz L (2013), p. 14.
- 9.
NOVACT (2016), p. 14.
- 10.
Armendariz L, Palou-Loverdos J (ed.) (2011), p. 64.
- 11.
Isenberg D (1997), p. 3.
- 12.
Klein N (2007), p. 306.
- 13.
See NATO, Towards a Grand Strategy for an Uncertain World, 2008.
- 14.
For more information see Frattini F., Security by design, speech at the EU Security Research Conference in Berlin, March 26, 2007. Available at http://europa.eu/rapid/press-release_SPEECH-07-188_en.htm, last accessed on October 20, 2016.
- 15.
Most PMSCs headquartered in Cyprus work in the field of maritime security.
- 16.
For more information see Report of the Working Group on the use of mercenaries as a means of violating human rights and impeding the exercise of the right of peoples to self-determination. Addendum: Mission to Iraq, (UNWG-Mission to Iraq). A/HRC/18/32/Add.4, 2011, p. 7. Available at: http://www2.ohchr.org/english/bodies/hrcouncil/docs/18session/A.HRC.18.32.Add.4_en.pdf, last accessed on October 20, 2016.
- 17.
See Interview with Doug Brook, president of International Stability Operations Association (ISOA). Available at http://www.pbs.org/wgbh/pages/frontline/shows/warriors/interviews/brooks.html, last accessed on October 20, 2016.
- 18.
Pingeot L (2012), p. 13.
- 19.
See G4S corporate information. Available at http://www.g4s.com/~/media/Files/Annual%20Reports/ARA%202012.pdf, last accessed on October 20, 2016.
- 20.
NOVACT (2016), p. 12.
- 21.
Stoddard A, Harmer A, Didomenico V (2008), pp. 8–9.
- 22.
Ibid.
- 23.
Pingeot L (2012), pp. 20–23.
- 24.
Fontaine R, Nagl J (2010), p. 9.
- 25.
Elsea J K, Schwartz M, Nakamura K H (2008).
- 26.
This category would also include functions such as protecting convoys, security for critical infrastructure (e.g., embassies, government buildings, etc.), guard services, etc.
- 27.
Includes services such as risk analysis and management, interrogation, counterintelligence, and cybersecurity.
- 28.
Encompasses training and consulting services for law enforcement in defensive tactics and strategic planning.
- 29.
Services related to establishing and managing chains of command and control and operational communication centers.
- 30.
Includes provision of security services, delimitation of security areas in base camps, etc.
- 31.
Refers to training and consulting services for armed forces.
- 32.
Functions related to keeping the public order traditionally performed by police, such as guarding and controlling access at borders.
- 33.
For more information, see European Parliament, Committee on Civil Liberties, Justice and Home Affair, Recommendation to the Council on profiling, notably on the basis of ethnicity and race, in counterterrorism, law enforcement, immigration, customs and border control, (Rapporteur: Sarah Ludford), September 30, 2009. Available at http://www.europarl.europa.eu/meetdocs/2004_2009/documents/pr/759/759535/759535en.pdf, last accessed on October 20, 2016.
- 34.
Delsol R (2008).
- 35.
Pingeot L (2012), p. 41.
- 36.
See Control Risks, RiskMap, 2015. Available at http://africanbusinessmagazine.com/uncategorised/control-risks-risk-map-2015-infographic/, last accessed on October 9, 2016.
- 37.
See the Amarante International corporate website at http://www.amarante.com/fr/, last accessed on October 21, 2016.
- 38.
See statements by Peter Cook at https://maritimecyprus.com/2016/04/19/the-security-association-for-the-maritime-industry-sami-announces-voluntary-liquidation/, last accessed on October 20, 2016.
- 39.
See United Nations Office of the High Commissioner for Human Rights, Working Group on the Use of Mercenaries, Report to the 68th session of the General Assembly, UN Doc. A/65/325, October 25, 2010. Available at https://documents-dds-ny.un.org/doc/UNDOC/GEN/N10/493/92/PDF/N1049392.pdf?OpenElement, last accessed on October 20, 2016.
- 40.
See the “Military and Law Enforcement Services” section of the Torres corporate website at http://www.torresco.com/services-solutions/military-police-training/, last accessed on October 9, 2016.
- 41.
See the MVM corporate website at http://www.mvminc.com/services/immigrationsupportanddetentionmanagement/securetransportationservices, last accessed on October 9, 2016.
- 42.
See the Polarm corporate website at http://www.polarmgroup.com/protestor-removal/4591666598, last accessed on October 20, 2016.
- 43.
For an account of PMSCs operating in Afghanistan until 2007, see: Rimli, L., and Schmeidl, S., Private Security Companies and Local Populations: An exploratory study of Afghanistan and Angola, SwissPeace, Bern, 2007. See also: Report of the Working Group on the Use of Mercenaries as a Means of Violating Human Rights and Impeding the Exercise of the Right of Peoples to Self-Determination. Addendum Mission to Afghanistan A/HRC/15/25/Add.2. Available at https://documents-dds-ny.un.org/doc/UNDOC/GEN/G10/143/57/PDF/G1014357.pdf?OpenElement, last accessed on October 20, 2016.
- 44.
Hammes T X (2011), p. 31.
- 45.
Aikins M (2012), p. 6.
- 46.
Armendariz L (2013), p. 14.
- 47.
Allawi A (2007), p. 120.
- 48.
NOVACT (2016), p. 14.
- 49.
UNWG-Mission to Iraq (2011), pp. 7–9.
- 50.
Armendáriz L (2015), p. 21.
- 51.
Ibid., p. 27.
- 52.
Ibid., pp. 26–27.
- 53.
NOVACT (2016), p. 62.
- 54.
Here we use the definition of critical infrastructure established by the US Department of Security. See https://www.dhs.gov/what-critical-infrastructure, last accessed on October 21, 2016.
- 55.
NOVACT (2016), p. 13.
- 56.
G4S corporate information is available at http://www.g4s.com/en/Media%20Centre/News/2013/09/19/Baghdad/, last accessed on October 20, 2016.
- 57.
Akkerman M (2016), pp. 17–24.
- 58.
For more details, see Observatory on Human Rights and Business in Middle East and North Africa, magal s3: El negocio de las fronteras. Available at www.odhe.cat, last accessed on October 1, 2016.
- 59.
Hayes B (2009), p. 4.
- 60.
For more information on the Fallujah case see http://www.corpwatch.org/article.php?id=12829, last accessed on October 10, 2016. For more information on the Battle of Najaf, see https://www.washingtonpost.com/archive/politics/2004/04/06/private-guards-repel-attack-on-us-headquarters/fe2e4dd8-b6d2-4478-b92a-b269f8d7fb9b/, last accessed on October 20, 2016.
- 61.
See case recorded by Shock Monitor (17OPT). Source: Waked A (2007). Available at http://www.ynetnews.com/articles/0,7340,L-3403082,00.html, last accessed on July 18, 2014.
- 62.
See case recorded by Shock Monitor (88OPT). Source: Yesh Din (2014), The Lawless Zones: The Transfer of Policing and Security Powers to the Civilian Security Coordinators in the Settlements and Outposts, p. 41.
- 63.
Ronen Y (2012), pp. 441–442.
- 64.
See case recorded by Shock Monitor (19OPT). Source: “Private Security Companies in the Occupied Palestinian Territory (OPT): An international Humanitarian Law Perspective,” Program on Humanitarian Policy and Conflict, Harvard University (2008), p. 4.
- 65.
See case recorded by Shock Monitor (80OPT). Source: Who profits research Center (2014) Proven Effective: Crowd Control Weapons in the Occupied Palestinian Territories.
- 66.
See case recorded by Shock Monitor (73OPT, 82OPT, 83OPT, 97OPT). Source: Palestinian Center for Human Rights database.
- 67.
See case recorded by Shock Monitor (23IRQ). Source: Kwok J (2006), “Armed Entrepreneurs,” Harvard International Review 28, no. 1, 2006, pp. 34–37.
- 68.
See case recorded by Shock Monitor (45IRQ). Source: Kim S, Jamie Leigh Jones Ordered to Pay $145,000 in Court Costs After Failed Rape Claim, ABC News. Available at http://abcnews.go.com/Business/jamie-leigh-jones-ordered-pay-145000-contractor-kbr/story?id=14635936, last accessed on October 21, 2016.
- 69.
See case recorded by Shock Monitor (52IRQ). Source: Isenberg D, Gun? Check. Radio? Check. Lawyer? Check!, The Huffington Post. Available at: http://www.huffingtonpost.com/david-isenberg/gun-check-radio-check-law_b_1217129.html, last accessed on August 2, 2014.
- 70.
See case recorded by Shock Monitor (98COL). Source: http://latino.foxnews.com/latino/news/2015/04/07/us-army-to-investigate-allegations-sexual-assault-by-military-personnel-in/, last accessed on October 20, 2016.
- 71.
See cases recorded by Shock Monitor (40IRQ, 47IRQ, 54IRQ, 57IRQ, 60IRQ, 61IRQ, 62IRQ).
- 72.
See case recorded by Shock Monitor (55IRQ). Source: UN Assistance Mission for Iraq (2007), “Human Rights Report,” no. 27. Available at http://www.ohchr.org/Documents/Press/UNAMIJuly-December2007EN.pdf, last accessed in 2014.
- 73.
See case recorded by Shock Monitor (115AFG). Source: Human Rights and Business Resource Center (2013), PMSC Bulletin. Available at https://business-humanrights.org/sites/default/files/media/documents/pmsc-bulletin-issue-4-30-apr-2013.pdf, last accessed October 20, 2016.
- 74.
See case recorded by Shock Monitor (119LY). Source: Ibid.
- 75.
See cases recorded by Shock Monitor (37IRQ, 39IRQ, 42IRQ, 44IRQ, 46IRQ, 48IRQ, 49IRQ, 50IRQ, 51IRQ, 53IRQ, 56IRQ, 58IRQ, 59IRQ, 63IRQ, 64IRQ, 65IRQ, 66IRQ, 67IRQ, 93AFG).
- 76.
See case recorded by Shock Monitor (95PE). Source: Pingeout L (2012), p. 11.
- 77.
See case recorded by Shock Monitor (106HON). Source: Human Rights Watch (2016) Honduras: No Justice for Wave of Killings Over Land. Available at: https://www.hrw.org/news/2014/02/12/honduras-no-justice-wave-killings-over-land, last accessed on October 20, 2016.
- 78.
See case recorded by Shock Monitor (122SA). Source: Huffington Post Canada. Available at http://www.huffingtonpost.ca/2012/11/01/forbes-coal-shooting-south-africa_n_2057386.html, last accessed on October 20, 2016.
- 79.
See case recorded by Shock Monitor (108TAI). Source: Business & Human Rights Resource Center, PMSC Bulletin, April 2014. Available at https://business-humanrights.org/sites/default/files/media/documents/pmsc-bulletin-issue-6-30-apr-2014.pdf, last accessed on October 20, 2016.
- 80.
See case recorded by Shock Monitor (104BZ). Source: Procuradoria da República no Mato Grosso do Sul. Available (in Portuguese) at http://www.prms.mpf.mp.br/servicos/sala-de-imprensa/noticias/2014/01/decretado-fechamento-de-empresa-de-seguranca-envolvida-em-morte-de-liderancas-indigenas-em-ms, last accessed on October 20, 2016.
- 81.
See case recorded by Shock Monitor (99COL). Source: NOVACT (2016).
- 82.
See case recorded by Shock Monitor (102EC). Source: Business, Conflict and Human Rights Newsletter (2015) no. 4. Available at http://media.wix.com/ugd/e6086f_272c3e2b72f34a9bae2be251b039e3a2.pdf, last accessed on October 15, 2016.
- 83.
See case recorded by Shock Monitor (103US). Source: Lazare S (2016), Reckless Security Firm Hired to Protect Dakota Pipeline Company Has Dark Past in Palestine, Global Research. Available at http://www.globalresearch.ca/reckless-security-firm-hired-to-protect-dakota-pipeline-company-has-dark-past-in-palestine/5545295, last accessed on October 21, 2016.
- 84.
For more information, see: Apps S (2016) G4S leaving Israel shows that the boycott, divestment and sanctions campaign is winning, The Independent. Available at http://www.independent.co.uk/voices/g4s-leaving-israel-shows-that-the-boycott-divestment-and-sanctions-campaign-is-winning-a6926051.html, last accessed on October 21, 2016.
- 85.
For more information see War on Want (2014) G4S securing profits, globalising injustice. Available at http://www.waronwant.org/sites/default/files/G4S%20securing%20profits,%20globalising%20injustice%20(corrected%202015).pdf, last accessed on October 21, 2016.
- 86.
See case recorded by Shock Monitor (78OPT). Source: Sherwood H (2012). Available at http://www.theguardian.com/world/2012/jan/22/palestinian-children-detained-jail-israel, last accessed on July 18, 2014.
- 87.
A breakdown of the data is available at http://www.btselem.org/statistics/minors_in_custody, last accessed on October 21, 2016.
- 88.
See case recorded by Shock Monitor (112SA). Source: Hopkings R (2015). Available at http://www.telegraph.co.uk/news/worldnews/africaandindianocean/southafrica/11847153/G4S-accused-of-torturing-inmates-to-death-in-South-Africa.html, last accessed on October 20, 2016.
- 89.
See case recorded by Shock Monitor (113UK). Source: Report on an unannounced inspection of HMP Oakwood by HM Inspector of Prisons. Available at https://www.justiceinspectorates.gov.uk/hmiprisons/wp-content/uploads/sites/4/2014/03/oakwood-2013.pdf, last accessed on October 20, 2016.
- 90.
See case recorded by Shock Monitor (24IRQ). Source: Al-Quaishi, et al. v. Nakhla and L-3 Services, Center for Constitutional Rights. Available at http://ccrjustice.org/Al-Quraishi-v-Nakhla-L3, last accessed on August 2, 2014.
- 91.
See case recorded by Shock Monitor (90UK). Source: De Winter-Schimtt R (2013), p. 25.
- 92.
See case recorded by Shock Monitor (110UK). Source: Townsend M (2013). Available at: https://www.theguardian.com/uk-news/2013/sep/21/sexual-abuse-yarls-wood-immigration.
- 93.
See case recorded by Shock Monitor (107PNG). Source: Business & Human Rights Resource Center (2014), PMSC Bulletin, no. 6. Available at https://business-humanrights.org/sites/default/files/media/documents/pmsc-bulletin-issue-6-30-apr-2014.pdf, last accessed on October 20, 2016.
- 94.
See case recorded by Shock Monitor (100BAH). Source: CORE (2015), p. 25.
- 95.
Case recorded by Shock Monitor (101ET). Source: Ibid.
- 96.
For more information, see Slovenia to hire private security firms to manage migrant flows, The Guardian, October 26, 2015. Available at https://www.theguardian.com/world/2015/oct/26/slovenia-private-security-firms-manage-migrant-flows-refugees, last accessed on December 1, 2016.
References
Aikins M (2012) Contracting the commanders: transition and the political economy of Afghanistan’s private security industry. Center on International Cooperation, New York University
Akkerman M (2016) Border wars: the arms dealers profiting from Europe’s refugee tragedy. Transnational Institute and Stop Wapenhandel
Allawi A (2007) The occupation of Iraq: winning the war, losing the peace. Yale University Press
Al-Quaishi, et al. v. Nakhla and L-3 Services, Center for Constitutional Rights. Available at www.ccrjustice.org/Al-Quraishi-v-Nakhla-L3. Accessed 2 Aug 2014
Apps S (2016) G4S leaving Israel shows that the boycott, divestment and sanctions campaign is winning. The Independent. Available at http://www.independent.co.uk/voices/g4s-leaving-israel-shows-that-the-boycott-divestment-and-sanctions-campaign-is-winning-a6926051.html. Accessed 21 Oct 2016
Armendáriz L (2013) Corporate private armies in Afghanistan: regulating private military and security companies (PMSCs) in a ‘Territorial State’. NOVACT
Armendáriz L (2015) The privatization of security in the Occupied Palestinian Territory, 2015
Armendáriz L, Palou-Loverdos J (eds) (2011) The privatization of warfare, violence and private military & security companies: a factual and legal approach to human rights abuses by PMSC in Iraq. NOVA
Buzatu A (2008) European practices of regulation of PMSCs and recommendations for regulation of PMSCs through international legal instruments. Geneva Centre for the Democratic Control of Armed Forces (DCAF), Geneva
Control Risks (2015) RiskMap 2015. Available at http://africanbusinessmagazine.com/uncategorised/control-risks-risk-map-2015-infographic/. Accessed 9 Oct 2016
CORE (2015) The bottom line: UK corporate abuses overseas
Delsol R (2008) Ethnic profiling, ID cards and European experience. Open Society Justice Initiative. Available at www.statewatch.org/news/2008/oct/n-ireland-nihrc-id-cards-profiling.pdf. Accessed 20 Oct 2016
DeWinter-Schmitt R (ed) (2013) Montreux five years on: an analysis of state efforts to implement Montreux document and legal obligations and good practices. Washington College of Law and NOVACT, Washington, DC
Elsea JK, Schwartz M, Nakamura KH (2008) Private security contractors in Iraq: background, legal status, and other issues, Congressional Research Service (CRS), RL 32419. Available at www.fas.org/sgp/crs/natsec/RL32419.pdf. Accessed 20 Oct 2016
Fontaine R, Nagl J (2010) Contracting in conflicts: the path to reform. Center for a New American Security. Available at www.s3.amazonaws.com/files.cnas.org/documents/CNAS_Contracting-in-Conflicts_Fontaine-Nagl.pdf. Accessed 20 Oct 2016
Hammes TX (2011) “Private contractors in conflict zones: the good, the bad and the strategic impact”, JFQ, no. 60. Available at www.psm.du.edu/media/documents/reports_and_stats/think_tanks/inss_hammes-private-contractors.pdf. Accessed 20 Oct 2016
Harvard University (2008) Private security companies in the Occupied Palestinian Territory (OPT): an international Humanitarian Law Perspective, Program on Humanitarian Policy and Conflict. Available at: www.hpcrresearch.org/sites/default/files/publications/PSCbrief.pdf. Accessed 07 June 2017
Hayes B (2009) NeoConOpticon: the EU security-industrial complex. Transnational Institute
Hopkings R (2015) G4S accused of torturing inmates to death in South Africa. The Telegraph
Human Rights Watch (2016) Honduras: no justice for wave of killings over land. Available at www.hrw.org/news/2014/02/12/honduras-no-justice-wave-killings-over-land. Accessed 20 Oct 2016
Isenberg D (1997) Soldier of Fortune Ltd: a profile today’s private sector corporate mercenary firms. Center for Defense Monograph, Washington, DC
Kim S, Jamie Leigh Jones ordered to pay $145,000 in court costs after failed rape claim. ABC News. Available at www.abcnews.go.com/Business/jamie-leigh-jones-ordered-pay-145000-contractor-kbr/story?id=14635936. Accessed 21 Oct 2016
Klein N (2007) The shock doctrine. Penguin, London
Kwok J (2006) Armed entrepreneurs. Harv Int Rev 28(1)
Lazare S (2016) Reckless security firm hired to protect Dakota Pipeline Company has dark past in Palestine, global research. Available at www.globalresearch.ca/reckless-security-firm-hired-to-protect-dakota-pipeline-company-has-dark-past-in-palestine/5545295. Accessed 21 Oct 2016
NATO (2008) Towards a grand strategy for an uncertain world
NOVACT (2016) The invisible force. A comparative analysis of the use of private military and security companies in Iraq, Occupied Palestinian Territories and Colombia. Lessons for regulation. Available at http://novact.org/wp-content/uploads/2016/07/NOVACT_THE_INVISIBLE_FORCE_2016.pdf. Accessed 20 Oct 2016
Observatory on Human Rights and Business in Middle East and North Africa (2016) magal s3: El negocio de las fronteras. Available at www.odhe.cat/magal-s3-espanya-s-l/. Accessed 1 Oct 2016
Pingeot L (2012) Dangerous partnership: private military & security companies and the UN. Global Policy Forum and Rosa Luxemburg Foundation, New York. Available at: www.rosalux.de/fileadmin/rls_uploads/pdfs/sonst_publikationen/studie_dangerous_partnership.pdf
Rimli L, Schmeidl S (2007) Private security companies and local populations: an exploratory study of Afghanistan and Angola. SwissPeace, Bern
Ronen Y (2012) Israel going private: “The use and regulation of private military and security companies in situations of armed conflict”. In: Bakker C, Mirko S (eds) Multilevel regulation of military and security contractors. Hart Publishing, Oxford
Sherwood H (2012) The Palestinian children – alone and bewildered – in Israel’s Al Jalame jail. The Guardian
Stoddard A, Harmer A, Didomenico V (2008) The use of private security providers and services in humanitarian operations. Humanitarian Policy Group Report 27
Townsend M (2013) Sexual abuses allegation corroborated at Yarl’s Wood inmigration center. The Guardian
UN Assistance Mission for Iraq (2007) “Human Rights Report”, no. 27. Available at http://www.ohchr.org/Documents/Press/UNAMIJuly-December2007EN.pdf. Accessed in 2014
UN Working Group on the Use of Mercenaries (2010a) Addendum: Mission to Afghanistan A/HRC/15/25/Add.2. Available at https://documents-dds-ny.un.org/doc/UNDOC/GEN/G10/143/57/PDF/G1014357.pdf?OpenElement. Accessed 20 Oct 2016
UN Working Group on the Use of Mercenaries (2010b) Report to the 68th session of the General Assembly, UN Doc. A/65/325. Available at https://documents-dds-ny.un.org/doc/UNDOC/GEN/N10/493/92/PDF/N1049392.pdf?OpenElement. Accessed 20 Oct 2016
UN Working Group on the Use of Mercenaries (2011) Addendum: Mission to Iraq A/HRC/18/32/Add.4. Available at: http://www2.ohchr.org/english/bodies/hrcouncil/docs/18session/A.HRC.18.32.Add.4_en.pdf. Accessed 20 Oct 2016
UN Working Group on the Use of Mercenaries (2013) Report to the 68th session of the General Assembly, UN Doc. A/68/339. Available at: www.un.org/en/ga/third/68/documentslist.shtml. Accessed 20 Oct 2016
Waked A (2007) Separation fence guards shoot at journalists. Ynet News
Who Profits Research Center (2014) Proven effective: crowd control weapons in the Occupied Palestinian Territories
Yesh Din (2014) The lawless zones: the transfer of policing and security powers to the civilian security coordinators in the settlements and outposts
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Daza, F. (2017). Delimitation and Presence of PMSCs: Impact on Human Rights. In: Torroja, H. (eds) Public International Law and Human Rights Violations by Private Military and Security Companies. Springer, Cham. https://doi.org/10.1007/978-3-319-66098-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-66098-1_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-66097-4
Online ISBN: 978-3-319-66098-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)