Communicating Safely in Conflict

Protect yourself and others through secure communication in conflict zones — including what to say, what not to say, and how to maintain contact when networks fail.

communicationconflictsecurityencrypted-messagingradioinformation-security

Communication in conflict zones is both a lifeline and a vulnerability. The ability to reach family, coordinate with allies, and receive reliable information can save lives. But the same communications can expose your location, reveal your plans, identify your associates, or provide intelligence to parties who wish you harm. Understanding what to communicate, how, and to whom is as essential as the communication itself.

This guide covers safe communication practices, protecting your devices, and maintaining contact when networks fail or are disrupted.

The Communications Threat Landscape

In conflict zones, your communications may be:

ThreatHow It WorksWho Is Responsible
InterceptionCalls, SMS, and unencrypted messages captured by signal intelligenceState intelligence services, military actors
Network monitoringTraffic analysis reveals who you communicate with even without reading contentSurveillance agencies, telecom operators under government pressure
Device seizurePhone or laptop seized at checkpoint reveals contacts, messages, historyCheckpoints, raids, arrest
Social engineeringSomeone gains your trust to extract informationInformants, enemy agents, opportunists
GeolocationPhotos, messages, or GPS data reveal your locationAnyone with access to your metadata

What Not to Communicate

Regardless of the channel, avoid sharing:

  1. Troop movements or security force locations — sharing this information even innocently can make you a target or implicate you.
  2. Location of civilians in hiding — this can directly endanger lives.
  3. Details of community security arrangements — does your neighbourhood have guards? Are there weapons? Do not share this.
  4. Plans for movement before you have moved — announce your arrival, not your departure.
  5. Identity of community informants, collaborators, or individuals in hiding.
  6. Specific coordinates, addresses, or landmarks near your location on social media.

⚠️ Social media posts with geolocation data, photographs of identifiable buildings, or mentions of specific locations have been used to target civilians, journalists, and aid workers in conflicts. Disable location tags on all photography in conflict-affected areas.

Protecting Your Devices

Immediate Measures

  1. Enable full device encryption on your phone and laptop — without the PIN, the data on an encrypted device is inaccessible.
  2. Use a strong PIN or passphrase (not fingerprint or face unlock — these can be compelled at checkpoints).
  3. Enable remote wipe — if your device is seized, you should be able to erase it remotely.
  4. Disable Bluetooth and Wi-Fi when not in use — both can be exploited for tracking.
  5. Disable location services for social media apps.
  6. Review your installed apps — some apps collect and transmit location and contact data.

At Checkpoints

  • Know your right to refuse unlocking your device — in many jurisdictions this right exists, but exercising it in a conflict zone may create risks.
  • Before entering high-risk areas, consider deleting sensitive messages and contacts that could endanger others if your phone is seized.
  • Have a "clean" phone available for high-risk situations if possible — one with no sensitive data.

Secure Messaging Apps

ToolSecurity LevelNotes
SignalVery highEnd-to-end encrypted; disappearing messages; widely trusted
WhatsAppHighEnd-to-end encrypted but metadata retained by company
TelegramMediumStandard chats not end-to-end encrypted; use Secret Chats mode
SMS / regular phone callsLowEasily intercepted; avoid for sensitive information

Use Signal or an equivalent end-to-end encrypted platform for any sensitive communications.

Operating When Networks Are Down

Conflict frequently disrupts telecommunications infrastructure. Have backup communication plans:

Short-Range Options

MethodRangeNotes
Two-way radio (walkie-talkie)2–8 km urban, farther in open terrainConversations are not encrypted — do not share sensitive information; use code words
Handheld ham radioRegionalRequires licence in most countries; in emergencies, formal licensing rules are often relaxed
Physical messengerWalking or vehicle rangeMost secure for sensitive information; very slow

Medium to Long Range

MethodRangeNotes
Satellite phone (Iridium, Thuraya)GlobalExpensive; the call connection process can be tracked by signal intelligence; move location after calls
Satellite messaging (Garmin inReach, SPOT)GlobalTwo-way messaging via satellite; lower intercept risk than voice
HF (shortwave) radioHundreds to thousands of kmUsed by humanitarian organisations; can receive international broadcasts on a shortwave receiver

Communication Security Practices

Code Words and Pre-Arranged Signals

For sensitive communications, agree on code words with trusted contacts:

  • A word or phrase that signals "I am safe"
  • A different word that signals "I am in trouble but cannot speak freely"
  • A check-in schedule: if you miss a check-in, your contact knows to escalate

This system requires no technology and works even in surveilled environments.

Need-to-Know Principle

Share information only with people who genuinely need it. The fewer people who know your location, plans, or associations, the smaller the risk of that information being compromised.

Verify Before You Trust

In conflict environments, people are recruited, coerced, or intimidated into becoming informants. Verify the identity of people you communicate with before sharing sensitive information. Use established, pre-agreed channels rather than responding to unexpected contact.

Managing Information from Others

You will receive a constant stream of information in a conflict zone — rumours, reports, secondhand accounts. Quality-control this information:

  1. Check the source — did they witness this directly or hear it from someone else?
  2. Verify across sources — one report of an event means little; three consistent independent reports is much more reliable.
  3. Be cautious of urgent, emotionally charged information — deliberate false information designed to manipulate civilian movement often has an emotional quality.
  4. Never share unverified information that could endanger people — false reports of a "safe route" or "clear area" have caused deaths.

Quick Reference — Conflict Communication Security

SituationAction
Need to send sensitive informationUse Signal or equivalent encrypted app
Approaching checkpointDelete sensitive contacts/messages; disable location; use PIN not fingerprint
Network is downSwitch to two-way radio or satellite device; use physical messenger for most sensitive info
Taking photos in conflict areaDisable geotagging; review before sharing for identifiable landmarks
Receiving urgent unverified reportVerify with second independent source before acting or sharing
Pre-arranged check-in missedEscalate according to pre-agreed protocol

This guide provides general communication security guidance for conflict environments. Threat models vary significantly by conflict and actor. Seek specialist training if you operate regularly in conflict zones.

// Sources

  • articleICRC Digital Security in Conflict
  • articleAccess Now Digital Security for Journalists
  • articleFront Line Defenders Security Handbook
  • articleElectronic Frontier Foundation Surveillance Self-Defense
  • articleCPJ Digital Safety for Journalists
offline_bolt

Read offline in the app

Take Communicating Safely in Conflict with you — no internet needed when it matters most.

downloadGet on Google Play