New Straits Times

HUMANITARI­ANS AND CYBERSECUR­ITY CHALLENGES

Integrated systems help to boost bargaining power but the info is vulnerable to theft, writes

- The writer is Associate Research Fellow with the Centre for Non-Traditiona­l Security Studies at S. Rajaratnam School of Internatio­nal Studies, Nanyang Technologi­cal University, Singapore

the need to negotiate access to and maintain acceptance in areas where people in need can reach you.

This region’s experience­s with natural disasters in areas with ongoing insurgenci­es underscore the significan­ce of this. Despite the impressive cessation of respective hostilitie­s in northern Sri Lanka and Aceh following the 2004 Tsunami, the conflict still complicate­d people’s ability to reach aid immediatel­y following the disaster. In Sri Lanka, this further deteriorat­ed when the conflict reignited during the longer recovery phase.

In 2012, Typhoon Bopha swept through several areas of Mindanao, the Philippine­s, affected by low-intensity conflict between the government and the Moro Islamic Liberation Front. This included Marawi City, parts of which remain under the control of insurgents at the time of writing. This adds new complexity that humanitari­ans already face in negotiatin­g access to population­s in need, and would have clear relevance were a natural disaster to strike the area now.

Negotiatin­g access in such contexts is more art than science. It involves convincing those with the power to block it that a humanitari­an presence adds value in some way they consider significan­t, and will not provoke excessive negative side-effects.

Improved operationa­l effectiven­ess born of better data technologi­es would, in most instances, help strengthen the case for allowing aid in. But, crucially, it might increase undesirabl­e ancillary impacts.

There are three core humanitari­an principles: impartiali­ty, independen­ce and neutrality. Together, independen­ce and neutrality ground the case that the presence of a humanitari­an organisati­on will not entail negative consequenc­es to those with the power to block access.

Maintainin­g independen­ce allows organisati­ons to argue that their actions do not conform to anyone else’s agenda; neutrality ensures that humanitari­an assistance and civilian protection will not advantage one side of a political disagreeme­nt or conflict.

As humanitari­an organisati­ons adopt new systems technologi­es to improve their collection, processing and analysis of informatio­n, the value of their assessment­s becomes increasing­ly strategic. Analyses of socio-political trends, actor networks and resource capabiliti­es, as well as data on movements or key health indicators, could all represent actionable intelligen­ce to other political actors.

As such, humanitari­ans become more tempting targets for cyberattac­ks. Several non-government­al organisati­ons working in or on Syria are already believed to have been targeted by hackers seeking to harvest informatio­n they possess.

Thus, new integrated systems technologi­es create a paradox for negotiatin­g access.

They strengthen a humanitari­an organisati­on’s bargaining power. But, at the same time, they undermine neutrality by facilitati­ng production of strategic intelligen­ce that is vulnerable to theft.

Would those actors state and non-state in or on Aceh, Sri Lanka and Mindanao still consent to humanitari­an access during a natural disaster or any other humanitari­an emergency if they perceive a risk of aid agencies unwittingl­y leaking valuable informatio­n to their opponents?

Humanitari­an organisati­ons have hitherto not prioritise­d cybersecur­ity. Doing so requires expertise they generally do not possess, and redirectin­g resources away from aiding people directly.

Budgets are already stretched across simultaneo­us famine threats in South Sudan, Somalia, Nigeria and Yemen, and the largest global refugee burden since the World War II. But, cybersecur­ity cannot be ignored; it has implicatio­ns on the vulnerabil­ity of those in need, and on organisati­ons’ own ability to negotiate access.

In a world where even the most sophistica­ted of government­s are unable to protect their data, the humanitari­an community faces a real challenge.

Humanitari­an organisati­ons must carefully consider what data they collect. In each case, they must decide whether the value of collecting and processing any given data for improving their aid effectiven­ess is outweighed by the risk posed by its loss.

This loss could be both to individual­s being assisted and to the organisati­on’s ability to maintain its negotiated access. This could result in discarding data that would otherwise be useful. Clearly, this will often be an extremely difficult calculatio­n to make.

However, much of the promise held by new humanitari­an data technologi­es depends on it.

 ?? FILE PIC ?? The Rahmatulla­h Mosque in Banda Aceh, Indonesia, was destroyed in the 2004 tsunami. Improved operationa­l effectiven­ess from better data technologi­es will allow aid to reach disaster areas quickly.
FILE PIC The Rahmatulla­h Mosque in Banda Aceh, Indonesia, was destroyed in the 2004 tsunami. Improved operationa­l effectiven­ess from better data technologi­es will allow aid to reach disaster areas quickly.

Newspapers in English

Newspapers from Malaysia