Load low-bandwidth site?
Help

Published: December 17, 2014

Webinar – Communications Technology and Humanitarian Delivery: Challenges and Opportunities for Security Risk Management

Share this:

EISF (@EISF1) teamed up with DisasterReady.org (@DisasterReady) to host a webinar entitled ‘Communications Technology and Humanitarian Delivery: Challenges and Opportunities for Security Risk Management’. The webinar launches GISF’s new paper of the same title, and features engaging discussion on opportunities and challenges of communications technology in humanitarian delivery from Imogen Wall (the paper’s co-editor) and Rory Byrne (Founder and CEO of Security First).

Imogen Wall (@imogenwall) discusses affected communities and communications technology, social media in the developing world, hacking, disinformation, and data trails. Imogen explores the contextual impact of the use of communications technology. Humanitarian organisations lose sight of the fact that, whether we like it or not, ‘whole environments in which we operate are being changed by technology because of the uptake of technological tools by the affected communities’. An example of this is of a woman in the Philippines researching on her laptop upcoming typhoons for her own community.

Communications technology is transforming the way humanitarian organisations work, and aid agencies must remember ‘communication is as much about listening and understanding the perspective of your affected communities … as it is talking at them’. This ‘listening and understanding’ via communications technology and social media, rather than the mere harnessing of communications tools, is one means of maintaining aid worker access to vulnerable populations. An on the ground opportunity offered by communications tools includes ‘data trails’, which through local communities’ mobile phones in Haiti, population movement patterns were tracked to provide information on where cholera might move during the outbreak.

Imogen touches on opportunities of social media in the developing world. ‘Twitter is a many to many platform,’ and a pertinent example of positively using Twitter includes the government of the Philippines using specific hashtags for early warning systems and responses to natural disasters. However there are also risks, Imogen discusses the impact of humanitarian organisations operating in a ‘cyber warfare environment’. This means there is a ‘whole new range of ways we can be co-opted, hacked or taken over’ on social media. Relevant examples are fake human rights reports being published on a humanitarian organisation’s website by the Free Syrian Army, and directs threats from al-Shabaab being posted on Twitter. Another challenge of social media is the spread of disinformation and rumours. It causes a lot of people to dismiss the information on social media or disinformation can sway communities opinions into a silo of people ‘who only see one side of the conflict’.

Rory Byrne (@roryireland) discusses how many organisations that use communications technology and social media make mistakes by not integrating them in a secure manner. ‘Sophisticated security methods need to be built into any kind of planning’, as there have been increases of targeted security breaches aimed at organisations. Tools are needed for security, but people need to be trained because security breaches can be linked with human error.

Humanitarian organisations must implement practical security tools, either ones that offer a high level of security but are less useable, or tools such as Google, which are good but often less secure. Many communications technology tools are easy to implement, but colleagues on the ground must have the technical capacity to support them. Human weakness must also be addressed by the system in place. ‘IT security can be breached by small human mistakes’, and so capabilities must be built within the IT team ‘to understand complex security threats and how to counter them’.

It is important that we start to recognise that communications technology and IT security are a part of the overall organisations’ security and resiliency. For example, if phone networks are shut down during protests, does staff know how they might communicate effectively? Good information security practice is also important in relation to collecting and storing information. If organisations want to protect themselves against potential cyber attacks, targeted security breaches, or human error; agencies must ask the five W questions (who/what/where/why/when) as well as addressing:

  • who has access to the information in your organisation;
  • who, outside your organisation, wants access; and,
  • what are their capabilities?

Faced with a seemingly insurmountable challenge, organisations may wish or try to adopt a head in the sand approach. However, both Imogen and Rory stress that a one of the biggest risks related to communications technology, humanitarian delivery and security risk management is not engaging at all. Opting out of communications technology and social media, in present day, is not an option for humanitarian organisations.

Author: Jessica MacLean

In 2013, Jessica graduated from the School of Oriental and African Studies (London) with an undergraduate degree in Development Studies and Politics. Prior to joining GISF she spent six months working in Sierra Leone with men on the prevention of violence against women and the promotion of sexual reproductive health rights. During the summer of 2013 Jessica was a communications, legal and policy research intern at the Fahamu Refugee Programme, a refugee legal aid online platform in Oxford. Jessica joined GISF in November 2014 as a Research and Projects Assistant.

 

Visit the Communications technology knowledge hub

 Visit the GISF Youtube Channel

Related:

World Humanitarian Day and ‘Aid in Danger’: a hard-look at violence against aid workers

The aid sector will be ‘celebrating’ the World Humanitarian Day with four level 3 emergencies. On a day that commemorates the bombing of the Canal Hotel in Baghdad we should be asking ourselves, do we need more humanitarian heroes, or do we need better responses (and better security-managed assistance) to…

2014

New Briefing Paper: Security Risk Management and Religion

GISF new briefing paper Security Risk Management and Religion: Faith and secularism in humanitarian assistance examines the impact that religion has on security risk management for humanitarian agencies, and considers whether a better understanding of religion can improve the security of organisations and individuals in the field.

2014

Event report: humanitarian action in fragile contexts

On Tuesday 8th July representatives from academia, INGOs, the private sector, journalists and other interested parties gathered at King’s College London to discuss key issues around new actors and the changing humanitarian space and how they will impact on security risk management (SRM). The focal point of the evening was…

2014