Assessing Threats in a Conflict Zone

Learn how to identify, evaluate, and respond to the full range of threats in a conflict environment — from armed actors to unexploded ordnance, disease, and crowd violence.

conflictthreat-assessmentsecurityarmed-actorsUXOrisk-management

In a conflict zone, your survival depends not on luck but on your ability to read the environment accurately and consistently. Threats in armed conflict are rarely simple or singular — they layer on top of one another, shift with the political situation, and change by the hour. A street that was safe yesterday may be lethal today. An armed group that ignored civilians last week may be recruiting or extorting this week. Learning to assess threats systematically is the skill that separates those who navigate conflict successfully from those who are caught by surprise.

This guide covers the full threat landscape in conflict environments, explains how to gather and evaluate information, and gives you a practical framework for maintaining situational awareness and making security decisions under uncertainty.

The Conflict Zone Threat Landscape

Threats in conflict zones fall into six broad categories, each requiring different awareness and response:

Threat CategoryExamplesPrimary Risk
Organised armed actorsMilitary units, insurgent groups, militias, paramilitariesDirect targeting, crossfire, checkpoint violence
Unexploded ordnance (UXO)Landmines, cluster munitions, IEDs, abandoned shellsInadvertent detonation from contact or movement
Criminal violenceArmed robbery, carjacking, kidnap for ransom, opportunistic assaultExploitation of security vacuum
Crowd violenceProtests turning violent, lynch mobs, communal clashesBeing caught in undirected mass violence
Disease and public healthCholera, typhoid, trauma infections, collapse of medical servicesIllness and inability to access treatment
Structural and environmentalDamaged buildings, flooded or mined roads, unexploded artillery in structuresCollapse, entrapment, secondary explosion

Understanding which categories are most active in your location at any given moment determines where you direct your attention and what precautions you take.

Organised Armed Actors

Armed groups — whether formal military forces or non-state armed actors — represent the most deliberate and intentional threat in a conflict zone. Their behaviour toward civilians is shaped by several factors:

Command and control: A disciplined, hierarchically controlled force with clear rules of engagement treats civilians differently from a fragmented militia operating without oversight. Understand who commands the forces in your area and whether that command structure is intact.

Ideology and goals: Some armed actors seek civilian compliance and support — they are less likely to harm you if you appear non-threatening and neutral. Others have explicit ethnic, religious, or political targeting criteria. Knowing which factions are active and what they stand for is critical to understanding your personal risk level.

Level of desperation or impunity: Forces that are winning tend to follow more disciplined behaviour; forces that are retreating, surrounded, or losing cohesion tend to commit more atrocities. Monitor the military situation and recognise when armed actors around you may be under extreme stress.

Criminal motivation: In protracted conflicts, armed groups often develop predatory economic behaviours — looting, extortion, kidnapping. Even ostensibly political armed actors may behave as criminals when economic opportunity presents itself.

⚠️ Never assume that the armed actor you encounter today will behave as the one you encountered yesterday. Factions split, commanders change, orders are reversed, and soldiers' behaviour shifts dramatically with alcohol, drugs, fear, and fatigue.

Unexploded Ordnance (UXO)

UXO kills and maims civilians long after the fighting stops. In active conflict it is an immediate danger on every road, path, field, and damaged building.

Landmines are pressure-activated or victim-operated devices buried in the ground. They are found in fields, roadsides, building approaches, and near strategic infrastructure. Never walk in grass or fields that have not been recently and safely traversed. Follow established, used paths only.

Cluster munitions scatter dozens of sub-munitions over a wide area. Many sub-munitions do not detonate on impact and lie inert until disturbed. They resemble cans, tubes, or small yellow cylinders. Never touch unfamiliar metal objects on the ground.

IEDs (Improvised Explosive Devices) are triggered by pressure, trip wire, remote control, or timer. They may be disguised as ordinary objects — bags, boxes, rocks, food. Be suspicious of any object out of place on a route, especially if it appears to have been recently placed.

Abandoned ordnance — shells, rockets, grenades left by retreating forces — are extremely unstable due to damage and age. Do not enter recently vacated military positions. Do not pick up weapons or munitions.

Criminal Violence in Conflict Settings

When state authority collapses, criminal actors fill the vacuum. The security threats you would face in a high-crime urban environment are amplified in conflict because:

  • Police are absent, overwhelmed, or themselves predatory
  • Courts and accountability mechanisms are non-functional
  • Armed criminal groups have access to military-grade weapons
  • Economic desperation among the population increases opportunistic crime

Armed robbery and carjacking increase dramatically near displacement routes, fuel queues, banking areas, and markets. Kidnapping for ransom targets foreigners, perceived wealthy individuals, and family members of diaspora sending money home.

Reducing criminal vulnerability:

  • Do not display valuables — jewellery, expensive phones, branded goods
  • Travel with companions; avoid isolated movement
  • Vary your routes and timings — predictable movement patterns are exploited
  • Keep emergency cash concealed separately from your main wallet
  • Know which areas have highest criminal activity (markets at close, fuel stations, banking areas)

Sources of Threat Information

Good threat assessment requires multiple information sources that you triangulate against one another.

SourceWhat It ProvidesLimitations
UN OCHA situation reportsMacro conflict overview, humanitarian access, major incidentsCan lag real-time events by 24–48 hours
Embassy security alertsCountry-level and city-level security alerts for nationalsPrimarily for foreigners; may be conservative or poorly localised
NGO security networks (INSO, GISF)Operational security intelligence for humanitarian workersRequires registration; may not cover all areas
Local contacts (community leaders, shopkeepers, clergy)Real-time, hyper-local intelligenceMay be partial, rumour-influenced, or reflect specific biases
Phone and radioBreaking news, rumour, crowd-sourced reportsQuality varies enormously; high rumour content
Personal observationDirect situational awarenessLimited range; observer bias

Triangulating information: Never act on a single source. If your local contact says fighting is near the market, check whether OCHA's latest report mentions increased activity in that sector, and whether your embassy has issued any alerts. Convergence of multiple sources increases reliability significantly.

Red Flags: Indicators of Escalating Danger

Learning to recognise warning indicators before a situation becomes immediately life-threatening is the key to decision-making with enough lead time to act.

Environmental red flags:

  • Markets, schools, and shops closing earlier than usual
  • Unusual military or armed actor movement and vehicle deployment
  • Civilians leaving an area on foot carrying belongings
  • Visible stockpiling — sandbags, barricades, digging
  • Loss of utility services (power, water) in absence of prior disruption
  • Children absent from streets
  • Livestock being moved out of an area

Social red flags:

  • Increase in rumours about imminent attack or offensive
  • Visible tension or altered behaviour in local community
  • Police or local officials quietly relocating their families
  • Shops running out of specific goods (fuel, medicines, staple foods)
  • Increase in checkpoint frequency or aggressiveness

Information red flags:

  • Communication networks disrupted or switched off (often precedes military operations)
  • Embassy emergency messaging becomes more frequent
  • Conflicting information from usually reliable sources (indicates rapidly changing situation)
  • Absence of information where there was previously regular reporting

Distinguishing Rumour from Fact in Conflict

In conflict zones, rumour spreads faster and more widely than accurate information. Acting on rumour can cause harm — it can trigger panic, cause you to expose yourself to danger to flee a non-existent threat, or cause you to stay when you should leave.

Test a rumour by asking:

  1. Who told this person? Can you trace it to a first-hand witness?
  2. Is this person known to be reliable and accurate in the past?
  3. Does this information align with any corroborating signals from other sources?
  4. Does this person have an interest in you acting on this information?
  5. How specific is it? Vague predictions ("there will be fighting") are less reliable than specific reports ("there are armed vehicles on the northern road").

Reliable information is usually specific, sourced from multiple independent channels, and consistent with observable indicators.

Personal Threat vs Area Threat

Not all threats affect you equally. Distinguishing between an area-level threat and a personal-level threat allows you to calibrate your response.

Area threats — shelling, airstrikes, street fighting — affect everyone indiscriminately in a geographic zone. The response is to not be in that zone.

Personal threats — based on your nationality, employer, religion, ethnicity, gender, or perceived wealth — are targeted. Someone may be safe in an area while you are specifically at risk based on who you are. Assess whether any armed actors active in your area have historical patterns of targeting people with your profile.

Intersection of both: In some conflict settings, you face both area threats from the general violence AND personal targeting. This compound threat requires both location-based precautions (don't be near the front line) and identity-based precautions (conceal identifying features, limit visibility of your employer or affiliations).

When to Escalate Your Security Posture

Security posture escalation means progressively restricting your movements and activities as threat levels rise. Have a pre-agreed framework with household members so that escalation decisions are made quickly without debate:

Posture 1 — Normal: Routine movement, work, and activities with standard precautions.

Posture 2 — Elevated: Reduce non-essential movement. Avoid areas with reported incidents. Increase frequency of check-ins. Verify routes before use.

Posture 3 — Restricted: Shelter in place during high-risk periods. Movement only for essential purposes (food, medical, evacuation). Prepare go-bag.

Posture 4 — Lockdown/Evacuation: No external movement except evacuation. Implement evacuation plan immediately.

Pre-decide what triggers each escalation. Removing these decisions from the moment of crisis prevents decision paralysis.

Recording and Reporting Incidents

Systematic recording of security incidents serves multiple purposes: it improves your own threat picture, contributes to community safety, and creates a historical record valuable for accountability and legal purposes.

For each incident, record:

  • Date, time, and exact location
  • Nature of the incident (shooting, explosion, checkpoint detention, armed robbery)
  • Who was involved (armed actors, civilians, nationality if identifiable)
  • What happened (sequence of events)
  • Any injuries or deaths
  • Source (first-hand observation, reported by named contact, heard second-hand)

Incident logs shared with NGO security networks (INSO), UN OCHA, or the ICRC help those organisations provide better security information to others operating in the same area.

The Daily Security Briefing Habit

Professional security advisors in conflict zones begin every day with a structured security briefing. You can implement a simplified version:

  1. Check available OCHA, embassy, and NGO security updates (5 minutes)
  2. Call or message two local contacts for on-the-ground conditions (5 minutes)
  3. Review your planned movements for the day and apply the current threat picture to each
  4. Identify abort criteria for each movement — the threshold at which you will turn back
  5. Share your daily plan with someone who can raise the alarm if you don't check in

This habit takes 15 minutes and dramatically improves your situational awareness and decision quality.

Quick Reference

SituationAction
You hear gunfire in your areaGet below window level, move to interior room, do not go outside to look
You see an unusual object on a pathStop, do not approach, warn others, report to UN/HALO Trust if reachable
Rumour of imminent attack is circulatingVerify with two independent sources before acting; check observable indicators
Local population is visibly moving outTake this seriously — locals often have better early warning than outside sources
Embassy issues security alertRead it in full; share with household; assess whether your security posture needs adjustment
You witness a security incidentRecord details immediately; do not share on social media; report to appropriate organisation
You believe you are being personally tracked or targetedImmediately vary routines, avoid predictable patterns, contact organisational security officer if applicable
Armed group behaviour suddenly changes in your areaTreat as a red flag; escalate security posture; prepare to move
offline_bolt

Read offline in the app

Take Assessing Threats in a Conflict Zone with you — no internet needed when it matters most.

downloadGet on Google Play