{"id":34873,"date":"2017-05-02T00:00:00","date_gmt":"2017-05-02T05:00:00","guid":{"rendered":"http:\/\/ready-for-feedback3.com\/shape-history\/fmr\/dind\/"},"modified":"2024-08-27T14:37:27","modified_gmt":"2024-08-27T19:37:27","slug":"dind","status":"publish","type":"fmr_content","link":"https:\/\/www.fmreview.org\/ar\/dind\/","title":{"rendered":"Security in ICRC field operations"},"content":{"rendered":"<p><font face=\"Arial\">The conflict environment too has changed considerably. For example, the chain of command among combatants has weakened to the point where it is often difficult to distinguish between the armed forces and gangs of bandits. All these factors combined make it extremely difficult for the ICRC to adhere to its traditional working methods. The number of people that have to be contacted to ensure that an operation runs smoothly has risen sharply, without this having any favourable effect on security, rather with the opposite effect.<\/font><\/p>\n<p><font face=\"Arial\">These developments have prompted the ICRC to focus even greater attention on matters relating to the safety of its field activities. What follows is an outline of the organisation&#39;s general approach to security.<\/font><\/p>\n<p><font face=\"Arial\">The first tenet of the ICRC&#39;s security policy is that danger is not the exception. Danger is inherent in the working conditions of ICRC staff and eliminating it completely would mean withdrawing all personnel from their working environment. It should, therefore, always be taken into account in operational decisions.<\/font><\/p>\n<p><font face=\"Arial\">The second tenet is that although security has its technical aspects, it is above all a political issue. No security rule and no protective measures can replace the establishment of a network of contacts among all the parties to a conflict so as to convince them of the ICRC&#39;s neutrality,<\/font><\/p>\n<p><font face=\"Arial\">impartiality and independence. Neutrality &#8211; and above all the combatants&#39; perception of that neutrality, a perception which stems from the organisation&#39;s independence and impartiality &#8211; is the best guarantee for the warring parties that the ICRC does not constitute a threat.<\/font><\/p>\n<p><font face=\"Arial\">Security rules must be understood and applied with both these tenets in mind. Compliance with the rules brings the risk down to an acceptable level, but cannot eliminate it altogether. <\/font><\/p>\n<p><strong><font face=\"Arial\">As a rule, security measures are aimed at:<\/font><\/strong><\/p>\n<ul>\n<li>\n\t\t<font face=\"Arial\">Preventing serious incidents by eliminating the possibility of their occurrence. Potential targets can be removed, for example by avoiding cash transfers; making sure that expatriates stay out of no-go areas; or prohibiting travel by road where there may be landmines. <\/font><\/li>\n<li>\n\t\t<font face=\"Arial\">Reducing risk by means of deterrents such as perimeter protection, guards and bomb shelters, or by means of preventive measures that promote respect for the ICRC&#39;s activities, staff and property (for example, negotiations with the warring parties, use of the ICRC emblem, notification systems, etc). <\/font><\/li>\n<li>\n\t\t<font face=\"Arial\">Limiting the consequences of an incident if it nevertheless occurs (by means of medical evacuations, insurance, etc). <\/font><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><font face=\"Arial\">Regardless of the measures taken, a certain degree of risk remains inevitable, and expatriate staff have to learn to live with it. Recognising this fact should not be interpreted as a lack of resolve to ensure their security, quite the contrary: the fact that only a residual element remains means that everything possible has been done to minimise the risk.<\/font><\/p>\n<p><font face=\"Arial\">Some levels of risk may be considered acceptable if they are justified by the humanitarian impact of the operation. That impact should be measured not only in terms of immediate benefits (food distributions, for example) but also with a view to the long term (surveys, etc). No risks should be taken for the sake of maintaining a presence or for reasons of competition.<\/font><\/p>\n<p><strong><font face=\"Arial\">Training for all<\/font><\/strong><\/p>\n<p><font face=\"Arial\">The best way of improving security is to give special priority to training, with a view to creating awareness of risks, ensuring consistency of security measures, and imparting the technical knowledge and the skills required for each individual to assume his or her responsibilities in this respect.<\/font><\/p>\n<p><strong><font face=\"Arial\">Training should be:<\/font><\/strong><\/p>\n<ul>\n<li>\n\t\t<font face=\"Arial\">given to expatriate and local staff alike; <\/font><\/li>\n<li>\n\t\t<font face=\"Arial\">geared to the context and the specific risks facing each individual; <\/font><\/li>\n<li>\n\t\t<font face=\"Arial\">adapted to each person&#39;s actual tasks and duties; <\/font><\/li>\n<li>\n\t\t<font face=\"Arial\">given at headquarters and in the delegations. <\/font><\/li>\n<\/ul>\n<h4>\n\t&nbsp;<\/h4>\n<p><strong><font face=\"Arial\">The seven pillars of security<\/font><\/strong><\/p>\n<p><font face=\"Arial\">The ICRC&#39;s security policy for field operations relies on the seven &#39;pillars&rsquo; described below. The first few of these are virtually exclusive to the ICRC, while the last are adopted by all organisations or multinational corporations to protect expatriate staff. The order of<\/font><\/p>\n<p><font face=\"Arial\">importance assigned to each of them will vary according to the type of threat encountered. In particular, the choice of active or passive protective measures (pillar number 7) will clearly depend entirely on the local situation.<\/font><\/p>\n<p><strong><font face=\"Arial\">1. Acceptance of the ICRC<\/font><\/strong><\/p>\n<p><font face=\"Arial\">The concept of acceptance is of paramount importance to the ICRC. To be able to operate, the organisation has to be accepted by the parties to the conflict. The disintegration of social structures and the emergence of warlords and organised crime make it indispensable for the ICRC to be accepted not only by the authorities of a constitutional State but by all groups wielding any power. Such acceptance is inextricably linked to the mandate of the ICRC as a neutral intermediary, and to its status as an impartial and independent humanitarian organisation. The ICRC has no means of exerting pressure to impose its activities. Persuasion and influence are its only weapons. Viewed from this angle, vulnerability paradoxically offers a form of protection.<\/font><\/p>\n<p><font face=\"Arial\">The means used to achieve acceptance are negotiation, projection of a consistent image, and efforts to spread knowledge of international humanitarian law and the Fundamental Red<\/font><\/p>\n<p><font face=\"Arial\">Cross\/Red Crescent Principles. These activities have to be conducted at all levels. In many, but not all, situations, two other means are used to strengthen acceptance: promotion of ICRC activities by making them as visible as possible; and broadcasting information to a wide range of audiences via the local media. <\/font><\/p>\n<p><font face=\"Arial\">Another factor that enhances security is acceptance by expatriates of the culture in which they are working. If they learn to understand the local system of values and customs they can act in a manner consistent with their environment. This understanding is essential if they are to be able to adjust to different situations and to the way in which a particular society functions, without having to become part of it. All expatriates have a duty to spend the time needed to familiarise themselves with the political, social and cultural features of the country to which they have been assigned, notably by reading. Familiarity with the armed groups operating in the ICRC&#39;s environment, and how they function, is also vital in order to adjust security measures to the prevailing dangers.<\/font><\/p>\n<p><strong><font face=\"Arial\">2. Identification<\/font><\/strong><\/p>\n<p><font face=\"Arial\">The second pillar is a logical consequence of the first: once its special role has been accepted, the ICRC must be identifiable. Identification relies mainly on the emblem of the red cross. To distinguish itself from other &#39;humanitarian&rsquo; players who use or misuse the red cross, the ICRC uses a logo consisting of a red cross surrounded by two concentric black circles between which appear the words &quot;Comit&eacute; International Gen&egrave;ve&quot;. Vehicles operating in sensitive situations fly a flag with this ICRC logo, to attract special attention; however, care must be taken not to overuse this means of protection.<\/font><\/p>\n<p><font face=\"Arial\">To supplement visual identification, buildings used by the ICRC and staff movements in the field are notified to all parties to the conflict. As modern methods of warfare make it possible to destroy a target long before visual contact has been established, notification is sometimes the only effective method of protection. This is particularly important when aircraft are used. Special technical means such as flashing blue lights and radar transponders may be used to identify hospital ships or medical aircraft.<\/font><\/p>\n<p><strong><font face=\"Arial\">3. Information<\/font><\/strong><\/p>\n<p><font face=\"Arial\">In any high-risk situation, information is a fundamental element of security. Reliable information makes it possible to anticipate events and to react in an appropriate manner as situations develop or when dangers arise during field trips. Information should therefore flow in all directions: from senior staff downwards and vice versa, and between ICRC colleagues and outside contacts.<\/font><\/p>\n<p><font face=\"Arial\">All field personnel must acquire the conditioned reflex of collecting and passing on as much information as possible on security matters, whether relating to the past or the present situation or to developing trends. All security incidents must be reported orally or in writing, depending on their importance, so that the delegation can take steps to avoid any similar events in the future or to anticipate more serious ones. Special attention must be paid to any signs that the situation is deteriorating, and care must be taken not to become accustomed to such signs, so as not to unconsciously raise one&#39;s threshold of tolerance of danger. Locally hired staff are not only entitled to be kept abreast of developments but are also a very important source of local news and reports on changes in the overall climate.<\/font><\/p>\n<p><font face=\"Arial\">As regards the exchange of information between the ICRC and other organisations and entities, it is essential to adopt an attitude that is as open as possible. Nonetheless, care must be taken not to overstep the limits of confidentiality, for example by never seeking to obtain or pass on information of a military nature.<\/font><\/p>\n<p><strong><font face=\"Arial\">4. Security regulations drawn up by individual ICRC delegations<\/font><\/strong><\/p>\n<p><font face=\"Arial\">Each delegation has its own security rules which prescribe proper behaviour and are specific to the country concerned. Where necessary, sub-delegations also have to draft security rules applicable to the local situation. The rules should lay down only the basic precautions and leave some room for manoeuvre. They are in no way a substitute for the responsibility every individual must assume towards himself and those affected by his or her decisions.<\/font><\/p>\n<p><font face=\"Arial\">The rules must be as concise yet as comprehensive as possible. They should cover all relevant subjects while stating only the essentials, so as to ensure that they do not lose their full impact. Security rules should be constantly updated in line with the situation, and deal with both preventive measures and appropriate reactions in the event of a security incident.<\/font><\/p>\n<p><strong><font face=\"Arial\">5. Personality<\/font><\/strong><\/p>\n<p><font face=\"Arial\">The safety of the ICRC&#39;s field activities depends to a large extent on the personal attributes of its staff, the most important of which are solidarity and a sense of responsibility.<\/font><\/p>\n<p><font face=\"Arial\">In dangerous or threatening situations or in other difficult circumstances, the security of several individuals may depend on one person&#39;s reactions and attitude. What is needed is not so much a remarkably well-balanced personality but an awareness of one&#39;s own limits, the capacity to remain calm and clear-headed, and acceptance of any weak points that might be revealed in the course of the mission. In this respect, to discover in the heat of action that one is not cut out for the job and to give it up shows courage and a sense of responsibility.<\/font><\/p>\n<p><font face=\"Arial\">Maintaining a healthy lifestyle is a further way to combat fatigue and nervous tension and preserve physical and psychological well-being.<\/font><\/p>\n<p><font face=\"Arial\">It is important to recognise signs of physical or mental stress and to talk about them openly. In the face of danger, these reactions may be normal and can play a useful role in alerting us to and regulating stress. If they are acknowledged and discussed, they soon dissipate. If they are ignored and suppressed, they lead to the taking of unnecessary risks. Talking over one&#39;s concerns and emotions is always the best way of maintaining a sense of perspective.<\/font><\/p>\n<p><font face=\"Arial\">In this connection, solidarity is of fundamental importance &#8211; staff must support each other in the delegations and during field operations.<\/font><\/p>\n<p><strong><font face=\"Arial\">6. Telecommunications<\/font><\/strong><\/p>\n<p><font face=\"Arial\">Telecommunications play an important part in security by facilitating the transmission of information, the monitoring of and checking movements in the field, giving warning of a deterioration in situation, or dealing with any crisis that may arise.<\/font><\/p>\n<p><font face=\"Arial\">The facilities made available should be geared to the specific situation, in terms of both quality and quantity:<\/font><\/p>\n<ul>\n<li>\n\t\t<font face=\"Arial\">modern, reliable equipment, which can be operated independently of the local infrastructure and is serviced by the ICRC; <\/font><\/li>\n<li>\n\t\t<font face=\"Arial\">a network appropriate to the geographical situation, with ICRC staff on site to set up and develop the telecommunications system as required; round-the-clock radio monitoring, if circumstances require; <\/font><\/li>\n<li>\n\t\t<font face=\"Arial\">training of the users, facilitated by the greatest possible level of standardisation. <\/font><\/li>\n<\/ul>\n<h4>\n\t&nbsp;<\/h4>\n<p><strong><font face=\"Arial\">7. Passive and active protective measures<\/font><\/strong><\/p>\n<p><font face=\"Arial\">Protective measures, whether passive or active, are taken only in situations where there is no other way of ensuring security. Sadly, such situations are on the increase. They fall into two main categories:<\/font><\/p>\n<p><font face=\"Arial\">(a) When there is a risk of indiscriminate attacks against the civilian population, the ICRC is no longer protected by its special status. For preventive purposes, delegations will opt for premises that are not in an exposed position and that have passive protective facilities, mainly bomb shelters. Individual protective measures such as bullet-proof vests are not normally used, for two reasons: the ICRC does not accept that its staff might be potential targets, and it does not want them to take greater risks because they feel protected. Whatever the protective measures taken, they are always as discreet as possible and must never be of military appearance.<\/font><\/p>\n<p><font face=\"Arial\">(b) In situations where crime and banditry are rife, ICRC expatriate staff are in the same position as any other foreigner living in the country. In this kind of context the emblem offers no protection. Vulnerability becomes a risk factor and delegations must make sure they are hard targets by adopting protective measures such as physical barriers, alarm systems, guards, etc. Active protective measures include armed escorts, which are used only in very exceptional circumstances and with the approval of headquarters. <\/font><\/p>\n<p><strong><font face=\"Arial\">Conclusion<\/font><\/strong><\/p>\n<p><font face=\"Arial\">The effectiveness of security regulations may be likened to the strength of a chain, which is as strong as its weakest link. Security in the field depends on coherence between all seven factors described above, and heads of delegation are responsible for ensuring their proper application by each and every staff member.<\/font><\/p>\n<p><font face=\"Arial\">Edited extract reproduced with permission from <i>International Review of the Red Cross<\/i>, No 323, June 1998.<\/font><\/p>\n<p>&nbsp;<\/p>\n<p><font face=\"Arial\"><i>Philippe Dind is the delegate in charge of security at the ICRC&#39;s Directorate of Operations. <\/i><\/font><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The conflict environment too has changed considerably. For example, the chain of command among combatants has weakened to the point where it is often difficult to distinguish between the armed forces and gangs of bandits. All these factors combined make it extremely difficult for the ICRC to adhere to its traditional working methods. The number&hellip;<\/p>\n","protected":false},"featured_media":0,"parent":0,"menu_order":0,"template":"","fmr_themes":[],"fmr_region":[],"fmr_issue":[],"fmr_year":[],"fmr_content_type":[27],"fmr_languages":[36],"fmr_list_years":[566],"class_list":["post-34873","fmr_content","type-fmr_content","status-publish","hentry","fmr_content_type-article","fmr_languages-english","fmr_list_years-566","entry","no-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security in ICRC field operations - Forced Migration Review<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fmreview.org\/dind\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security in ICRC field operations - Forced Migration Review\" \/>\n<meta property=\"og:description\" content=\"The conflict environment too has changed considerably. For example, the chain of command among combatants has weakened to the point where it is often difficult to distinguish between the armed forces and gangs of bandits. All these factors combined make it extremely difficult for the ICRC to adhere to its traditional working methods. The number&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fmreview.org\/dind\/\" \/>\n<meta property=\"og:site_name\" content=\"Forced Migration Review\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-27T19:37:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fmreview.org\/dind\/\",\"url\":\"https:\/\/www.fmreview.org\/dind\/\",\"name\":\"Security in ICRC field operations - Forced Migration Review\",\"isPartOf\":{\"@id\":\"https:\/\/www.fmreview.org\/#website\"},\"datePublished\":\"2017-05-02T05:00:00+00:00\",\"dateModified\":\"2024-08-27T19:37:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fmreview.org\/dind\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fmreview.org\/dind\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fmreview.org\/dind\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.fmreview.org\/ar\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security in ICRC field operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fmreview.org\/#website\",\"url\":\"https:\/\/www.fmreview.org\/\",\"name\":\"Forced Migration Review\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.fmreview.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fmreview.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.fmreview.org\/#organization\",\"name\":\"Forced Migration Review\",\"url\":\"https:\/\/www.fmreview.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/www.fmreview.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.fmreview.org\/wp-content\/uploads\/2024\/02\/FMR_logo1.svg\",\"contentUrl\":\"https:\/\/www.fmreview.org\/wp-content\/uploads\/2024\/02\/FMR_logo1.svg\",\"width\":53,\"height\":62,\"caption\":\"Forced Migration Review\"},\"image\":{\"@id\":\"https:\/\/www.fmreview.org\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security in ICRC field operations - Forced Migration Review","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fmreview.org\/dind\/","og_locale":"ar_AR","og_type":"article","og_title":"Security in ICRC field operations - Forced Migration Review","og_description":"The conflict environment too has changed considerably. For example, the chain of command among combatants has weakened to the point where it is often difficult to distinguish between the armed forces and gangs of bandits. All these factors combined make it extremely difficult for the ICRC to adhere to its traditional working methods. The number&hellip;","og_url":"https:\/\/www.fmreview.org\/dind\/","og_site_name":"Forced Migration Review","article_modified_time":"2024-08-27T19:37:27+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.fmreview.org\/dind\/","url":"https:\/\/www.fmreview.org\/dind\/","name":"Security in ICRC field operations - Forced Migration Review","isPartOf":{"@id":"https:\/\/www.fmreview.org\/#website"},"datePublished":"2017-05-02T05:00:00+00:00","dateModified":"2024-08-27T19:37:27+00:00","breadcrumb":{"@id":"https:\/\/www.fmreview.org\/dind\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fmreview.org\/dind\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fmreview.org\/dind\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fmreview.org\/ar\/"},{"@type":"ListItem","position":2,"name":"Security in ICRC field operations"}]},{"@type":"WebSite","@id":"https:\/\/www.fmreview.org\/#website","url":"https:\/\/www.fmreview.org\/","name":"Forced Migration Review","description":"","publisher":{"@id":"https:\/\/www.fmreview.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fmreview.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/www.fmreview.org\/#organization","name":"Forced Migration Review","url":"https:\/\/www.fmreview.org\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/www.fmreview.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.fmreview.org\/wp-content\/uploads\/2024\/02\/FMR_logo1.svg","contentUrl":"https:\/\/www.fmreview.org\/wp-content\/uploads\/2024\/02\/FMR_logo1.svg","width":53,"height":62,"caption":"Forced Migration Review"},"image":{"@id":"https:\/\/www.fmreview.org\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/fmr_content\/34873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/fmr_content"}],"about":[{"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/types\/fmr_content"}],"version-history":[{"count":1,"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/fmr_content\/34873\/revisions"}],"predecessor-version":[{"id":38269,"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/fmr_content\/34873\/revisions\/38269"}],"wp:attachment":[{"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/media?parent=34873"}],"wp:term":[{"taxonomy":"fmr_themes","embeddable":true,"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/fmr_themes?post=34873"},{"taxonomy":"fmr_region","embeddable":true,"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/fmr_region?post=34873"},{"taxonomy":"fmr_issue","embeddable":true,"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/fmr_issue?post=34873"},{"taxonomy":"fmr_year","embeddable":true,"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/fmr_year?post=34873"},{"taxonomy":"fmr_content_type","embeddable":true,"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/fmr_content_type?post=34873"},{"taxonomy":"fmr_languages","embeddable":true,"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/fmr_languages?post=34873"},{"taxonomy":"fmr_list_years","embeddable":true,"href":"https:\/\/www.fmreview.org\/ar\/wp-json\/wp\/v2\/fmr_list_years?post=34873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}