Protect yourself and others through secure communication in conflict zones — including what to say, what not to say, and how to maintain contact when networks fail.
Communication in conflict zones is both a lifeline and a vulnerability. The ability to reach family, coordinate with allies, and receive reliable information can save lives. But the same communications can expose your location, reveal your plans, identify your associates, or provide intelligence to parties who wish you harm. Understanding what to communicate, how, and to whom is as essential as the communication itself.
This guide covers safe communication practices, protecting your devices, and maintaining contact when networks fail or are disrupted.
In conflict zones, your communications may be:
| Threat | How It Works | Who Is Responsible |
|---|---|---|
| Interception | Calls, SMS, and unencrypted messages captured by signal intelligence | State intelligence services, military actors |
| Network monitoring | Traffic analysis reveals who you communicate with even without reading content | Surveillance agencies, telecom operators under government pressure |
| Device seizure | Phone or laptop seized at checkpoint reveals contacts, messages, history | Checkpoints, raids, arrest |
| Social engineering | Someone gains your trust to extract information | Informants, enemy agents, opportunists |
| Geolocation | Photos, messages, or GPS data reveal your location | Anyone with access to your metadata |
Regardless of the channel, avoid sharing:
⚠️ Social media posts with geolocation data, photographs of identifiable buildings, or mentions of specific locations have been used to target civilians, journalists, and aid workers in conflicts. Disable location tags on all photography in conflict-affected areas.
| Tool | Security Level | Notes |
|---|---|---|
| Signal | Very high | End-to-end encrypted; disappearing messages; widely trusted |
| High | End-to-end encrypted but metadata retained by company | |
| Telegram | Medium | Standard chats not end-to-end encrypted; use Secret Chats mode |
| SMS / regular phone calls | Low | Easily intercepted; avoid for sensitive information |
Use Signal or an equivalent end-to-end encrypted platform for any sensitive communications.
Conflict frequently disrupts telecommunications infrastructure. Have backup communication plans:
| Method | Range | Notes |
|---|---|---|
| Two-way radio (walkie-talkie) | 2–8 km urban, farther in open terrain | Conversations are not encrypted — do not share sensitive information; use code words |
| Handheld ham radio | Regional | Requires licence in most countries; in emergencies, formal licensing rules are often relaxed |
| Physical messenger | Walking or vehicle range | Most secure for sensitive information; very slow |
| Method | Range | Notes |
|---|---|---|
| Satellite phone (Iridium, Thuraya) | Global | Expensive; the call connection process can be tracked by signal intelligence; move location after calls |
| Satellite messaging (Garmin inReach, SPOT) | Global | Two-way messaging via satellite; lower intercept risk than voice |
| HF (shortwave) radio | Hundreds to thousands of km | Used by humanitarian organisations; can receive international broadcasts on a shortwave receiver |
For sensitive communications, agree on code words with trusted contacts:
This system requires no technology and works even in surveilled environments.
Share information only with people who genuinely need it. The fewer people who know your location, plans, or associations, the smaller the risk of that information being compromised.
In conflict environments, people are recruited, coerced, or intimidated into becoming informants. Verify the identity of people you communicate with before sharing sensitive information. Use established, pre-agreed channels rather than responding to unexpected contact.
You will receive a constant stream of information in a conflict zone — rumours, reports, secondhand accounts. Quality-control this information:
| Situation | Action |
|---|---|
| Need to send sensitive information | Use Signal or equivalent encrypted app |
| Approaching checkpoint | Delete sensitive contacts/messages; disable location; use PIN not fingerprint |
| Network is down | Switch to two-way radio or satellite device; use physical messenger for most sensitive info |
| Taking photos in conflict area | Disable geotagging; review before sharing for identifiable landmarks |
| Receiving urgent unverified report | Verify with second independent source before acting or sharing |
| Pre-arranged check-in missed | Escalate according to pre-agreed protocol |
This guide provides general communication security guidance for conflict environments. Threat models vary significantly by conflict and actor. Seek specialist training if you operate regularly in conflict zones.
// Sources
Take Communicating Safely in Conflict with you — no internet needed when it matters most.
downloadGet on Google Play