SlideShare a Scribd company logo
1 of 13
Inter Agency Assessment
Mission
Sadah/Wadi Dahwan
17-25 August 2012




      Please Ensure Your Phone/VHF Radios Are Off or Silent

UN SECURITY                                                   YEMEN
Background
   Fighting in Northwest Area

   Saudi/Yemeni Border

   Thousand Of Displaced Reported

   Alleged Crossing of the Border
    ◦   IDP?
    ◦   Refugees?
    ◦   Security Issues?
    ◦   Food Security? WASH? Health? Etc…

UN SECURITY                                 YEMEN
Inter Agency
Assessment Mission
   WHAT: Humanitarian Assessment

   WHO: UNHCR, OCHA, WFP, UNICEF, DSS,
    OHCHR

   WHERE: Wadi Dahwan, Sadah District

   WHEN: 17-25 August 2012

   HOW: Road Mission

   Programme Assessed as CRITICAL
UN SECURITY                               YEMEN
Saudi/Yeme
 ni Border


             Wadi Dahwan
                                 IDPs/Refugee
                                       s
         Sadah             100
                           Km




                                      Security Level Area

                                        4 - Substantial
                                   Armed Conflict           6
                 Sana’a            Terrorism                3
                  330              Crime                    5
                 Km/Sou            Civil Unrest             5
                   th
                                   Hazards                  3
General Situation

   There is NO direct threat towards UN and
    Humanitarian operations in Yemen.

   Our collective degree of vigilance, awareness and
    preparedness is the KEY DETERRENT against any
    direct/indirect, ‘deliberate or isolated’ threats
    towards our Mission.

   Utilize our best practices in ‘security risk
    management to minimize potential problems
    towards our staff.
UN SECURITY                                        YEMEN
Threat Assessment

   Armed Conflict
    ◦ Crossfire
    ◦ Mine/UXO

   Terrorism
    ◦ Hostage Incident
    ◦ IED


UN SECURITY              YEMEN
Threat Assessment

   Crime
    ◦ Car Theft
    ◦ Armed Attack

   Civil Unrest
    ◦ Road Blockage

   Hazards
    ◦ Road Traffic Accident
    ◦ Illness

UN SECURITY                   YEMEN
Risk Analysis
   HIGH RISK
    ◦ IED
    ◦ Armed Attack
    ◦ Road Blockage

   MEDIUM RISK
    ◦   Crossfire
    ◦   Mine/UXO
    ◦   Hostage Incident
    ◦   Car Theft
    ◦   Road Traffic Accident
    ◦   Illness

UN SECURITY                     YEMEN
Mitigating Measures

   Armour Vehicles

   Armed Escort (Police)

   Travelling Only During Daylight Time

   Medical Doctor

UN SECURITY                           YEMEN
Residual Risks

   MEDIUM RISK

    ◦ IED

    ◦ Armed Attack

    ◦ Road Blockage


UN SECURITY           YEMEN
Recommendations
       MOSS Compliance
    ◦    Communications
    ◦    Travel Procedures
    ◦    Field Vehicles
    ◦    Personal Equipment
    ◦    Medical
       Implementation of Mitigating
        Measures
       Security Update Before Departing
       Abort Mission - No Proper Armed
UN SECURITY                                YEMEN
Actions and Conclusions

   Submission of List of Participants NLT 12
    August, COB

   Logistics & Admin Arrangements ASAP

   Submission of Security Clearances NLT
    14 August, COB

   Special Security Cell, 16 August @ 1600
    hrs
UN SECURITY                              YEMEN
Thank You




       SAFE!   SECURE!   ALIVE!

UN SECURITY                   YEMEN

More Related Content

Viewers also liked

Viewers also liked (12)

Bhagavad gita sanskrit with hindi translation
Bhagavad gita   sanskrit with hindi translationBhagavad gita   sanskrit with hindi translation
Bhagavad gita sanskrit with hindi translation
 
Process Improvement Through Use Of Lean Six Sigma Methods 110609
Process Improvement Through Use Of Lean Six Sigma Methods 110609Process Improvement Through Use Of Lean Six Sigma Methods 110609
Process Improvement Through Use Of Lean Six Sigma Methods 110609
 
Western Division AFS SciComm Intro
Western Division AFS SciComm IntroWestern Division AFS SciComm Intro
Western Division AFS SciComm Intro
 
The Grey Legacy Chapter One
The Grey Legacy Chapter OneThe Grey Legacy Chapter One
The Grey Legacy Chapter One
 
4legs
4legs4legs
4legs
 
2012 AFS Osborne-Gowey Twitter For Scientists
2012 AFS Osborne-Gowey Twitter For Scientists2012 AFS Osborne-Gowey Twitter For Scientists
2012 AFS Osborne-Gowey Twitter For Scientists
 
Social diversity, Inclusion, and International Policy at ESCP Europe
Social diversity, Inclusion, and International Policy at ESCP EuropeSocial diversity, Inclusion, and International Policy at ESCP Europe
Social diversity, Inclusion, and International Policy at ESCP Europe
 
Double lucid interval
Double lucid intervalDouble lucid interval
Double lucid interval
 
Strategic implications for a European cross border multi-campus business school
Strategic implications for a European cross border multi-campus business schoolStrategic implications for a European cross border multi-campus business school
Strategic implications for a European cross border multi-campus business school
 
Key challenges and opportunities: business schools and higher education
Key challenges and opportunities: business schools and higher educationKey challenges and opportunities: business schools and higher education
Key challenges and opportunities: business schools and higher education
 
Arbol genealogico
Arbol genealogicoArbol genealogico
Arbol genealogico
 
Children's Geographies
Children's GeographiesChildren's Geographies
Children's Geographies
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Sra exercise presentation 120811

  • 1. Inter Agency Assessment Mission Sadah/Wadi Dahwan 17-25 August 2012 Please Ensure Your Phone/VHF Radios Are Off or Silent UN SECURITY YEMEN
  • 2. Background  Fighting in Northwest Area  Saudi/Yemeni Border  Thousand Of Displaced Reported  Alleged Crossing of the Border ◦ IDP? ◦ Refugees? ◦ Security Issues? ◦ Food Security? WASH? Health? Etc… UN SECURITY YEMEN
  • 3. Inter Agency Assessment Mission  WHAT: Humanitarian Assessment  WHO: UNHCR, OCHA, WFP, UNICEF, DSS, OHCHR  WHERE: Wadi Dahwan, Sadah District  WHEN: 17-25 August 2012  HOW: Road Mission  Programme Assessed as CRITICAL UN SECURITY YEMEN
  • 4. Saudi/Yeme ni Border Wadi Dahwan IDPs/Refugee s Sadah 100 Km Security Level Area 4 - Substantial Armed Conflict 6 Sana’a Terrorism 3 330 Crime 5 Km/Sou Civil Unrest 5 th Hazards 3
  • 5. General Situation  There is NO direct threat towards UN and Humanitarian operations in Yemen.  Our collective degree of vigilance, awareness and preparedness is the KEY DETERRENT against any direct/indirect, ‘deliberate or isolated’ threats towards our Mission.  Utilize our best practices in ‘security risk management to minimize potential problems towards our staff. UN SECURITY YEMEN
  • 6. Threat Assessment  Armed Conflict ◦ Crossfire ◦ Mine/UXO  Terrorism ◦ Hostage Incident ◦ IED UN SECURITY YEMEN
  • 7. Threat Assessment  Crime ◦ Car Theft ◦ Armed Attack  Civil Unrest ◦ Road Blockage  Hazards ◦ Road Traffic Accident ◦ Illness UN SECURITY YEMEN
  • 8. Risk Analysis  HIGH RISK ◦ IED ◦ Armed Attack ◦ Road Blockage  MEDIUM RISK ◦ Crossfire ◦ Mine/UXO ◦ Hostage Incident ◦ Car Theft ◦ Road Traffic Accident ◦ Illness UN SECURITY YEMEN
  • 9. Mitigating Measures  Armour Vehicles  Armed Escort (Police)  Travelling Only During Daylight Time  Medical Doctor UN SECURITY YEMEN
  • 10. Residual Risks  MEDIUM RISK ◦ IED ◦ Armed Attack ◦ Road Blockage UN SECURITY YEMEN
  • 11. Recommendations  MOSS Compliance ◦ Communications ◦ Travel Procedures ◦ Field Vehicles ◦ Personal Equipment ◦ Medical  Implementation of Mitigating Measures  Security Update Before Departing  Abort Mission - No Proper Armed UN SECURITY YEMEN
  • 12. Actions and Conclusions  Submission of List of Participants NLT 12 August, COB  Logistics & Admin Arrangements ASAP  Submission of Security Clearances NLT 14 August, COB  Special Security Cell, 16 August @ 1600 hrs UN SECURITY YEMEN
  • 13. Thank You SAFE! SECURE! ALIVE! UN SECURITY YEMEN