Mitigating physical risk posed by technology - To responders in volatile situations

Mitigating physical risk posed by technology - To responders in volatile situations

Written with Kristen Pearn and Sarah A Jabbar; May 2022

Read the full report


AI generated summary:

This report examines the intersection of digital technology and the physical safety of humanitarian responders operating in volatile environments. While Information Communication Technologies (ICTs) like mobile phones and web-based platforms are essential for life-saving coordination, remote needs assessments, and data collection, they also introduce significant security vulnerabilities. The digitization of communications has made humanitarian staff susceptible to third-party interception, digital tracking, and data breaches, which can lead to real-world consequences such as kidnapping or the confiscation of supplies.

A critical finding of the research is the disparity in risk between international and national staff. National staff often face heightened surveillance from local governments and, unlike their international counterparts, typically lack the option for evacuation during emergencies. The situation in Afghanistan in 2021 serves as a primary case study, illustrating how the mass collection of sensitive data—including biometrics—can be weaponized by hostile actors when digital infrastructure falls into their hands.

To mitigate these risks, the report advocates for a shift from reactive measures to proactive digital security standards. Key recommendations include implementing mandatory digital-literacy training for all responders, conducting regular risk assessments of used platforms, and adopting centralized, secure authentication tools like Humanitarian ID. Additionally, the study highlights the importance of private sector collaboration, noting that technology companies possess the specialized expertise required to secure communications in high-risk zones.

Ultimately, the humanitarian sector must prioritize digital safety as a core component of physical security. Strengthening information-sharing protocols and ensuring the immunity of national staff are vital steps toward protecting those providing aid in the world's most unstable regions. As cyber threats continue to evolve, investing in "soft protections" and technical infrastructure is no longer optional but a necessity for effective humanitarian action.