Digital Security in Aid and Development

Digital Security In Aid And Development  Dette

Source: IICD /​Flickr

18 Nov 2015, 
published in

Technologies are used increasingly in humanitarian, development and human rights. This field of work is sometimes abbreviated with ICT4D,” or information communication technologies for development. But new technologies can also introduce new risks, especially concerning digital security and privacy. 

To make ICT4D more secure and safe, aid actors (or anyone working with technologies) can use threat models” to play through possible attacks and hacks ahead of time. Being more alert to digital vulnerabilities can help prevent data breaches and devastating damage, which is especially important in the aid sector.

Digital Risks Are Real

Data horror stories are all over the news today: companies lose staff and client data, banks lose money, governments expose civilians, security firms are compromised and hackers, too, get hacked.

Such cyber threats” are just as real and risky in aid and ICT4D. What is costly or inconvenient for businesses, however, could lead to lethal consequences in conflict and disaster settings.

Perks and Perils

ICT4D is, without doubt, transformative. Smartphones, software and computing power connect the previously unconnected, speed up surveying and help save data from dying as printed PDFs in dusty drawers.

But in the wrong hands, maps with the exact location of vulnerable people, routes of aid trucks and records of a person’s health levels provide playbooks for harm. Imagine the damage an armed organization could do knowing exactly when and where a hungry person receives food. In digital form, this type of information is susceptible to interception, often without being noticed.

If we don’t become more careful, the data that helps us plan and monitor our work might help others implement attacks that are entirely at odds with our intentions.

Data Risks in Aid

Warnings for ICT4D data damage abound – we just have to start looking: Online maps put people into hospitals. Online platforms expose defenseless people. The improving aid information landscape also aids” surveillance.

ICT devices themselves can create problems. Local authorities can become suspicious, sometimes banning phones and internet access and consequently access to aid workers who use those tools. Our research found incidents of people being targeted and killed when seen with smartphones.

In another scenario, if a woman reports physical abuse with a mobile phone her husband uses, too, more bad than good could happen. Similarly, data leaks revealing sensitive aid details to local communities can create stigma and harm or ostracize groups and individuals.

Meanwhile, aid data security is often abhorrent. We use easy-to-crack passwords for multiple accounts or keep them on sticky notes next to our computers. We send sensitive documents through the web like open postcards, i.e., unencrypted. We even circumvent the digital restrictions our IT teams put in place if they are inconvenient.

In stark contrast, our adversaries grow increasingly cyber-savvy: governments worldwide bring their malware usage to perfection and organized armed groups, e.g., ISIS, cyber-arm themselves.

No Cyber Strategy in the Aid Sector 

The ICT4D community is quick to recognize privacy concerns, but we drop them all too frequently; other priorities, deemed more urgent, push digital security aside. It does not help that solutions seem to be hidden behind complicated code and cryptic binary. Digital security is difficult for everyone. But even if technology-related threats can be hard to understand, we cannot afford to overlook them.

It is contradictory that human rights, development and humanitarian action lack standards and risk awareness when it comes to working with technologies. The aid sector is well-equipped with norms and guidelines as well as aid staff who are well-attuned to ethics.

These principles and values need to be translated into our use of ICT. The sector that is working hard to do no harm” should go the extra mile to do no digital harm” either. Our first step should be threat modeling.

Copying Computer Scientists: Threat Models

When software designers review the tools they build, threat models help them to ask the hard questions. What assets, i.e., sensitive information, does my technology handle? Who might want to attack it? What gaps or loopholes could attackers use?

Putting these risk factors together, they are able to evaluate the likelihood of different threats and how they can respond to them:

  • Accept the risk;
  • Mitigate it technically, or transfer it;
  • Avoid it by scrapping the software project altogether. 

In other words, threat models make computer security more proactive and resilient. They increase awareness and preparedness, which – as aid workers know all too well – improves decision-making if and when worst-case scenarios occur.

Your Own ICT4D Threat Modeling Exercise

The next time you plan or discuss an ICT4D project, play through the worst possible scenario and decide ahead of time how to react. Ask yourself these questions:

  1. Assets: Where do you store sensitive and valuable information?
  2. Adversaries: Who might want to access and abuse this data?
  3. Attacks: How could these adversaries get, steal or compromise the data?

Your reaction and response will depend on your project and context. Sometimes, you might find that you can manage problems if they happen. In other instances, it might be wise not to use technology at all.

A winning strategy is to practice extra care when deciding which data to digitize and make susceptible to interception. In fact, most measures to mitigate technology-related threats are not technical at all. Here are three suggestions:

  1. Decide carefully which data to digitize.
  2. Organize a detailed data security briefing with your IT staff or provider.
  3. Use existing resources, e.g., the responsible data forum, security in a box, the digital first aid kit and Oxfam’s Responsible Program Data Policy.

You can find more details on these tricks in other texts – for example, here, here and here.

For now, dare to be alert! Make it a routine to recognize how the technologies you use could be attacked and lead to data harm. Detecting threats remains the best way to prevent them.

This is an updated version of a blog post that originally appeared on ICTworks on November 182015.