Skip to main content

Abstract

Today, private military and security companies (PMSCs) can be found in various operational contexts and provide a wide range of services for public and private clients. It is increasingly common to see PMSCs patrolling borders, providing security in airports, protecting extractive industry projects, or providing military services in areas affected by conflict.

The demand for PMSCs’ services has grown considerably in the last decade, reflecting the process of privatization of security in areas in which it was traditionally provided by public security forces. The outsourcing of these services, which in many cases involve the use of force, has a vast impact on human rights.

This chapter delimits the presence and services provided by PMSCs at the international level and analyzes how their operations impact human rights. The author identifies and systematizes types of human rights’ violations according the services provided by PMSC and their operational contexts with the aim of providing more evidence and factors to open a public debate on which security areas should remain under the management of public institutions and which PMSC activities should be regulated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See www.shockmonitor.org.

  2. 2.

    Akkerman M (2016), pp. 41–42.

  3. 3.

    The rise of the UK’s private security companies, BBC News, November 2, 2010. Available at http://www.bbc.com/news/business-11521579, last accessed on October 20, 2016.

  4. 4.

    Buzatu A (2008), p. 7.

  5. 5.

    See United Nations Office of the High Commissioner for Human Rights, Working Group on the Use of Mercenaries, Report to the 68th session of the General Assembly, UN Doc. A/68/339, August 20, 2013. Available at: http://www.un.org/en/ga/third/68/documentslist.shtml, last accessed on October 20, 2016.

  6. 6.

    Fontaine R, Nagl J (2010), p. 11.

  7. 7.

    DeWinter-Schmitt R. (ed.) (2013), p. 18.

  8. 8.

    Armendáriz L (2013), p. 14.

  9. 9.

    NOVACT (2016), p. 14.

  10. 10.

    Armendariz L, Palou-Loverdos J (ed.) (2011), p. 64.

  11. 11.

    Isenberg D (1997), p. 3.

  12. 12.

    Klein N (2007), p. 306.

  13. 13.

    See NATO, Towards a Grand Strategy for an Uncertain World, 2008.

  14. 14.

    For more information see Frattini F., Security by design, speech at the EU Security Research Conference in Berlin, March 26, 2007. Available at http://europa.eu/rapid/press-release_SPEECH-07-188_en.htm, last accessed on October 20, 2016.

  15. 15.

    Most PMSCs headquartered in Cyprus work in the field of maritime security.

  16. 16.

    For more information see Report of the Working Group on the use of mercenaries as a means of violating human rights and impeding the exercise of the right of peoples to self-determination. Addendum: Mission to Iraq, (UNWG-Mission to Iraq). A/HRC/18/32/Add.4, 2011, p. 7. Available at: http://www2.ohchr.org/english/bodies/hrcouncil/docs/18session/A.HRC.18.32.Add.4_en.pdf, last accessed on October 20, 2016.

  17. 17.

    See Interview with Doug Brook, president of International Stability Operations Association (ISOA). Available at http://www.pbs.org/wgbh/pages/frontline/shows/warriors/interviews/brooks.html, last accessed on October 20, 2016.

  18. 18.

    Pingeot L (2012), p. 13.

  19. 19.

    See G4S corporate information. Available at http://www.g4s.com/~/media/Files/Annual%20Reports/ARA%202012.pdf, last accessed on October 20, 2016.

  20. 20.

    NOVACT (2016), p. 12.

  21. 21.

    Stoddard A, Harmer A, Didomenico V (2008), pp. 8–9.

  22. 22.

    Ibid.

  23. 23.

    Pingeot L (2012), pp. 20–23.

  24. 24.

    Fontaine R, Nagl J (2010), p. 9.

  25. 25.

    Elsea J K, Schwartz M, Nakamura K H (2008).

  26. 26.

    This category would also include functions such as protecting convoys, security for critical infrastructure (e.g., embassies, government buildings, etc.), guard services, etc.

  27. 27.

    Includes services such as risk analysis and management, interrogation, counterintelligence, and cybersecurity.

  28. 28.

    Encompasses training and consulting services for law enforcement in defensive tactics and strategic planning.

  29. 29.

    Services related to establishing and managing chains of command and control and operational communication centers.

  30. 30.

    Includes provision of security services, delimitation of security areas in base camps, etc.

  31. 31.

    Refers to training and consulting services for armed forces.

  32. 32.

    Functions related to keeping the public order traditionally performed by police, such as guarding and controlling access at borders.

  33. 33.

    For more information, see European Parliament, Committee on Civil Liberties, Justice and Home Affair, Recommendation to the Council on profiling, notably on the basis of ethnicity and race, in counterterrorism, law enforcement, immigration, customs and border control, (Rapporteur: Sarah Ludford), September 30, 2009. Available at http://www.europarl.europa.eu/meetdocs/2004_2009/documents/pr/759/759535/759535en.pdf, last accessed on October 20, 2016.

  34. 34.

    Delsol R (2008).

  35. 35.

    Pingeot L (2012), p. 41.

  36. 36.

    See Control Risks, RiskMap, 2015. Available at http://africanbusinessmagazine.com/uncategorised/control-risks-risk-map-2015-infographic/, last accessed on October 9, 2016.

  37. 37.

    See the Amarante International corporate website at http://www.amarante.com/fr/, last accessed on October 21, 2016.

  38. 38.

    See statements by Peter Cook at https://maritimecyprus.com/2016/04/19/the-security-association-for-the-maritime-industry-sami-announces-voluntary-liquidation/, last accessed on October 20, 2016.

  39. 39.

    See United Nations Office of the High Commissioner for Human Rights, Working Group on the Use of Mercenaries, Report to the 68th session of the General Assembly, UN Doc. A/65/325, October 25, 2010. Available at https://documents-dds-ny.un.org/doc/UNDOC/GEN/N10/493/92/PDF/N1049392.pdf?OpenElement, last accessed on October 20, 2016.

  40. 40.

    See the “Military and Law Enforcement Services” section of the Torres corporate website at http://www.torresco.com/services-solutions/military-police-training/, last accessed on October 9, 2016.

  41. 41.

    See the MVM corporate website at http://www.mvminc.com/services/immigrationsupportanddetentionmanagement/securetransportationservices, last accessed on October 9, 2016.

  42. 42.

    See the Polarm corporate website at http://www.polarmgroup.com/protestor-removal/4591666598, last accessed on October 20, 2016.

  43. 43.

    For an account of PMSCs operating in Afghanistan until 2007, see: Rimli, L., and Schmeidl, S., Private Security Companies and Local Populations: An exploratory study of Afghanistan and Angola, SwissPeace, Bern, 2007. See also: Report of the Working Group on the Use of Mercenaries as a Means of Violating Human Rights and Impeding the Exercise of the Right of Peoples to Self-Determination. Addendum Mission to Afghanistan A/HRC/15/25/Add.2. Available at https://documents-dds-ny.un.org/doc/UNDOC/GEN/G10/143/57/PDF/G1014357.pdf?OpenElement, last accessed on October 20, 2016.

  44. 44.

    Hammes T X (2011), p. 31.

  45. 45.

    Aikins M (2012), p. 6.

  46. 46.

    Armendariz L (2013), p. 14.

  47. 47.

    Allawi A (2007), p. 120.

  48. 48.

    NOVACT (2016), p. 14.

  49. 49.

    UNWG-Mission to Iraq (2011), pp. 7–9.

  50. 50.

    Armendáriz L (2015), p. 21.

  51. 51.

    Ibid., p. 27.

  52. 52.

    Ibid., pp. 26–27.

  53. 53.

    NOVACT (2016), p. 62.

  54. 54.

    Here we use the definition of critical infrastructure established by the US Department of Security. See https://www.dhs.gov/what-critical-infrastructure, last accessed on October 21, 2016.

  55. 55.

    NOVACT (2016), p. 13.

  56. 56.

    G4S corporate information is available at http://www.g4s.com/en/Media%20Centre/News/2013/09/19/Baghdad/, last accessed on October 20, 2016.

  57. 57.

    Akkerman M (2016), pp. 17–24.

  58. 58.

    For more details, see Observatory on Human Rights and Business in Middle East and North Africa, magal s3: El negocio de las fronteras. Available at www.odhe.cat, last accessed on October 1, 2016.

  59. 59.

    Hayes B (2009), p. 4.

  60. 60.

    For more information on the Fallujah case see http://www.corpwatch.org/article.php?id=12829, last accessed on October 10, 2016. For more information on the Battle of Najaf, see https://www.washingtonpost.com/archive/politics/2004/04/06/private-guards-repel-attack-on-us-headquarters/fe2e4dd8-b6d2-4478-b92a-b269f8d7fb9b/, last accessed on October 20, 2016.

  61. 61.

    See case recorded by Shock Monitor (17OPT). Source: Waked A (2007). Available at http://www.ynetnews.com/articles/0,7340,L-3403082,00.html, last accessed on July 18, 2014.

  62. 62.

    See case recorded by Shock Monitor (88OPT). Source: Yesh Din (2014), The Lawless Zones: The Transfer of Policing and Security Powers to the Civilian Security Coordinators in the Settlements and Outposts, p. 41.

  63. 63.

    Ronen Y (2012), pp. 441–442.

  64. 64.

    See case recorded by Shock Monitor (19OPT). Source: “Private Security Companies in the Occupied Palestinian Territory (OPT): An international Humanitarian Law Perspective,” Program on Humanitarian Policy and Conflict, Harvard University (2008), p. 4.

  65. 65.

    See case recorded by Shock Monitor (80OPT). Source: Who profits research Center (2014) Proven Effective: Crowd Control Weapons in the Occupied Palestinian Territories.

  66. 66.

    See case recorded by Shock Monitor (73OPT, 82OPT, 83OPT, 97OPT). Source: Palestinian Center for Human Rights database.

  67. 67.

    See case recorded by Shock Monitor (23IRQ). Source: Kwok J (2006), “Armed Entrepreneurs,” Harvard International Review 28, no. 1, 2006, pp. 34–37.

  68. 68.

    See case recorded by Shock Monitor (45IRQ). Source: Kim S, Jamie Leigh Jones Ordered to Pay $145,000 in Court Costs After Failed Rape Claim, ABC News. Available at http://abcnews.go.com/Business/jamie-leigh-jones-ordered-pay-145000-contractor-kbr/story?id=14635936, last accessed on October 21, 2016.

  69. 69.

    See case recorded by Shock Monitor (52IRQ). Source: Isenberg D, Gun? Check. Radio? Check. Lawyer? Check!, The Huffington Post. Available at: http://www.huffingtonpost.com/david-isenberg/gun-check-radio-check-law_b_1217129.html, last accessed on August 2, 2014.

  70. 70.

    See case recorded by Shock Monitor (98COL). Source: http://latino.foxnews.com/latino/news/2015/04/07/us-army-to-investigate-allegations-sexual-assault-by-military-personnel-in/, last accessed on October 20, 2016.

  71. 71.

    See cases recorded by Shock Monitor (40IRQ, 47IRQ, 54IRQ, 57IRQ, 60IRQ, 61IRQ, 62IRQ).

  72. 72.

    See case recorded by Shock Monitor (55IRQ). Source: UN Assistance Mission for Iraq (2007), “Human Rights Report,” no. 27. Available at http://www.ohchr.org/Documents/Press/UNAMIJuly-December2007EN.pdf, last accessed in 2014.

  73. 73.

    See case recorded by Shock Monitor (115AFG). Source: Human Rights and Business Resource Center (2013), PMSC Bulletin. Available at https://business-humanrights.org/sites/default/files/media/documents/pmsc-bulletin-issue-4-30-apr-2013.pdf, last accessed October 20, 2016.

  74. 74.

    See case recorded by Shock Monitor (119LY). Source: Ibid.

  75. 75.

    See cases recorded by Shock Monitor (37IRQ, 39IRQ, 42IRQ, 44IRQ, 46IRQ, 48IRQ, 49IRQ, 50IRQ, 51IRQ, 53IRQ, 56IRQ, 58IRQ, 59IRQ, 63IRQ, 64IRQ, 65IRQ, 66IRQ, 67IRQ, 93AFG).

  76. 76.

    See case recorded by Shock Monitor (95PE). Source: Pingeout L (2012), p. 11.

  77. 77.

    See case recorded by Shock Monitor (106HON). Source: Human Rights Watch (2016) Honduras: No Justice for Wave of Killings Over Land. Available at: https://www.hrw.org/news/2014/02/12/honduras-no-justice-wave-killings-over-land, last accessed on October 20, 2016.

  78. 78.

    See case recorded by Shock Monitor (122SA). Source: Huffington Post Canada. Available at http://www.huffingtonpost.ca/2012/11/01/forbes-coal-shooting-south-africa_n_2057386.html, last accessed on October 20, 2016.

  79. 79.

    See case recorded by Shock Monitor (108TAI). Source: Business & Human Rights Resource Center, PMSC Bulletin, April 2014. Available at https://business-humanrights.org/sites/default/files/media/documents/pmsc-bulletin-issue-6-30-apr-2014.pdf, last accessed on October 20, 2016.

  80. 80.

    See case recorded by Shock Monitor (104BZ). Source: Procuradoria da República no Mato Grosso do Sul. Available (in Portuguese) at http://www.prms.mpf.mp.br/servicos/sala-de-imprensa/noticias/2014/01/decretado-fechamento-de-empresa-de-seguranca-envolvida-em-morte-de-liderancas-indigenas-em-ms, last accessed on October 20, 2016.

  81. 81.

    See case recorded by Shock Monitor (99COL). Source: NOVACT (2016).

  82. 82.

    See case recorded by Shock Monitor (102EC). Source: Business, Conflict and Human Rights Newsletter (2015) no. 4. Available at http://media.wix.com/ugd/e6086f_272c3e2b72f34a9bae2be251b039e3a2.pdf, last accessed on October 15, 2016.

  83. 83.

    See case recorded by Shock Monitor (103US). Source: Lazare S (2016), Reckless Security Firm Hired to Protect Dakota Pipeline Company Has Dark Past in Palestine, Global Research. Available at http://www.globalresearch.ca/reckless-security-firm-hired-to-protect-dakota-pipeline-company-has-dark-past-in-palestine/5545295, last accessed on October 21, 2016.

  84. 84.

    For more information, see: Apps S (2016) G4S leaving Israel shows that the boycott, divestment and sanctions campaign is winning, The Independent. Available at http://www.independent.co.uk/voices/g4s-leaving-israel-shows-that-the-boycott-divestment-and-sanctions-campaign-is-winning-a6926051.html, last accessed on October 21, 2016.

  85. 85.

    For more information see War on Want (2014) G4S securing profits, globalising injustice. Available at http://www.waronwant.org/sites/default/files/G4S%20securing%20profits,%20globalising%20injustice%20(corrected%202015).pdf, last accessed on October 21, 2016.

  86. 86.

    See case recorded by Shock Monitor (78OPT). Source: Sherwood H (2012). Available at http://www.theguardian.com/world/2012/jan/22/palestinian-children-detained-jail-israel, last accessed on July 18, 2014.

  87. 87.

    A breakdown of the data is available at http://www.btselem.org/statistics/minors_in_custody, last accessed on October 21, 2016.

  88. 88.

    See case recorded by Shock Monitor (112SA). Source: Hopkings R (2015). Available at http://www.telegraph.co.uk/news/worldnews/africaandindianocean/southafrica/11847153/G4S-accused-of-torturing-inmates-to-death-in-South-Africa.html, last accessed on October 20, 2016.

  89. 89.

    See case recorded by Shock Monitor (113UK). Source: Report on an unannounced inspection of HMP Oakwood by HM Inspector of Prisons. Available at https://www.justiceinspectorates.gov.uk/hmiprisons/wp-content/uploads/sites/4/2014/03/oakwood-2013.pdf, last accessed on October 20, 2016.

  90. 90.

    See case recorded by Shock Monitor (24IRQ). Source: Al-Quaishi, et al. v. Nakhla and L-3 Services, Center for Constitutional Rights. Available at http://ccrjustice.org/Al-Quraishi-v-Nakhla-L3, last accessed on August 2, 2014.

  91. 91.

    See case recorded by Shock Monitor (90UK). Source: De Winter-Schimtt R (2013), p. 25.

  92. 92.

    See case recorded by Shock Monitor (110UK). Source: Townsend M (2013). Available at: https://www.theguardian.com/uk-news/2013/sep/21/sexual-abuse-yarls-wood-immigration.

  93. 93.

    See case recorded by Shock Monitor (107PNG). Source: Business & Human Rights Resource Center (2014), PMSC Bulletin, no. 6. Available at https://business-humanrights.org/sites/default/files/media/documents/pmsc-bulletin-issue-6-30-apr-2014.pdf, last accessed on October 20, 2016.

  94. 94.

    See case recorded by Shock Monitor (100BAH). Source: CORE (2015), p. 25.

  95. 95.

    Case recorded by Shock Monitor (101ET). Source: Ibid.

  96. 96.

    For more information, see Slovenia to hire private security firms to manage migrant flows, The Guardian, October 26, 2015. Available at https://www.theguardian.com/world/2015/oct/26/slovenia-private-security-firms-manage-migrant-flows-refugees, last accessed on December 1, 2016.

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Felipe Daza .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Daza, F. (2017). Delimitation and Presence of PMSCs: Impact on Human Rights. In: Torroja, H. (eds) Public International Law and Human Rights Violations by Private Military and Security Companies. Springer, Cham. https://doi.org/10.1007/978-3-319-66098-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66098-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66097-4

  • Online ISBN: 978-3-319-66098-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics