Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
RSIS Alumni
Outreach
Global Networks
About Global Networks
RSIS Alumni
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
Cohesive Societies
Sustainable Security
Other Resource Pages
News Releases
Speeches
Video/Audio Channel
External Podcasts
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National SecurityInstitute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other eventsRSIS Alumni
  • Outreach
      Global NetworksAbout Global NetworksRSIS Alumni
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      Cohesive SocietiesSustainable SecurityOther Resource PagesNews ReleasesSpeechesVideo/Audio ChannelExternal Podcasts
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS

      Get in Touch

    Connect
    Search
    • RSIS
    • Publication
    • RSIS Publications
    • Cybersecurity in the Humanitarian Sector: New Challenges and Solutions
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • RSIS Commentary Series
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • Future Issues
    • IDSS Papers
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers

    CO22118 | Cybersecurity in the Humanitarian Sector: New Challenges and Solutions
    Christopher Chen

    18 November 2022

    download pdf

    SYNOPSIS

    On 3 November 2022, the International Committee of the Red Cross released its report, “Digitalising the Red Cross, Red Crescent and Red Crystal Emblems: Benefits, Risks and Possible Solutions.” It was in response to cyber intrusions the movement faces. As the humanitarian sector integrates digital technologies into its operations, it faces significant cyber risks. How should the sector navigate this increasingly complex space?

    Source: Unsplash

    COMMENTARY

    Humanitarian organisations need to collect and process huge quantities of personal data. While digitalisation improves the effectiveness of responses and operations, it also raises concerns about the risk of cyberattacks on sensitive information.

    Earlier this year, a group of unknown hackers breached the systems of the International Committee of the Red Cross (ICRC) and accessed the personal data of vulnerable populations across the world. This high-profile case is a stark reminder that humanitarian organisations face cyber threats.

    The sector needs to assess current approaches and find robust solutions to safeguard digital assets. The sector is now exploring the use of digital emblems – digital markers or signals to identify protected assets in cyberspace – to enhance protection measures in adapting to the new realities of working in the digital space.

    Cybersecurity in the Humanitarian Sector

    In recent times, coordinated attacks on humanitarian organisations have raised questions about the preparedness of the aid sector in responding to and mitigating risks in cyberspace.

    In January 2022, a cybersecurity company hired by the ICRC discovered that a server containing information related to the International Red Cross and Red Crescent Movement’s Restoring Family Links service was compromised by an unknown group of hackers.

    This exposed the personal data and information of over 500,000 vulnerable individuals, many of whom were separated from their families due to armed conflict, disasters, and migration. The exposed data included names, locations, and contact information collected by at least 60 National Red Cross and Red Crescent Societies around the world.

    This was by no means a unique and isolated incident. In June 2021, hackers launched a phishing attack on humanitarian and development organisations by mimicking the email account of the US Agency for International Development (USAID). Hackers also infiltrated the computer networks of the United Nations in 2019 and in 2021.

    The main issue is that cybersecurity remains underfunded and under-prioritised in the aid sector. While demand increases for data-driven approaches, investment in data protection has not kept pace. Large international NGOs have started to invest in in-house cybersecurity experts and access to technical know-how; however, many of the smaller organisations have less resources and capacities to secure their data.

    Digital Emblems: Opportunities and Challenges

    Under International Humanitarian Law (IHL), the Red Cross, Red Crescent, and the Red Crystal emblems are used to identify and legally protect personnel, units, establishments, and transports in times of armed conflict. Generally, the emblems aim to protect medical services of the armed forces and civilian hospitals in war time. They are used by the National Red Cross and National Red Crescent Societies, the International Federation, and the ICRC.

    Cyber-attacks are now a reality in armed conflict. The ICRC is exploring how the red cross, red crescent, and red crystal emblems can be digitalised and used in the cyber realm to cope with this new dynamic. In practice, digital emblems can be used to mark out protected digital assets – for instance, the personal data files of vulnerable populations found on the ICRC servers – to help avoid erroneous targeting, as well as to signify that they enjoy protection under IHL.

    While there is definite protective value in the use of digital emblems, challenges remain in implementation and doubts exist regarding their effectiveness. At an ICRC Expert Meeting in 2020, it was highlighted that marking an asset with a digital emblem runs the risk of identifying it as a ‘soft target’ to malicious actors, which ironically makes the asset more easily and systematically targeted.

    As IHL is only applicable during times of armed conflict, situating digital emblems under its ambit might not necessarily increase its protective value in times of peace and normalcy. Furthermore, the physical emblems were created specifically to protect medical assets; transferring this protection to non-medical assets is problematic as it requires the restructuring of current humanitarian legal frameworks.

    Tackling Challenges in Cyberspace: Lessons from Singapore

    The use of digital emblems shows how the humanitarian sector is trying to enhance its security by adapting to new threats in the digital space. But, more than such piecemeal initiatives, what is required is system-wide investment and reform, specifically with regard to cybersecurity and resilience.

    To tackle challenges in the digital space, the aid sector can learn from national governments and the private sector that have demonstrated experience in cybersecurity. The Global Cybersecurity Index 2020 ranks Singapore fourth globally and  first in the Asia-Pacific region when it comes to cybersecurity. Singapore’s Cybersecurity Strategy 2021 lays out key pillars and enablers to strengthen the security and resilience of the nation’s digital infrastructure.

    There are a few strategies which can be adopted by the humanitarian sector.

    Firstly, humanitarian organisations need to build resilient infrastructure. This will require stakeholders to support investment in cybersecurity.

    Secondly, humanitarian organisations need to improve in-house capacity to assess, respond to, and mitigate cyber threats. This requires sustained investment in capacity development to help build up a pool of cybersecurity talent and to ensure that research and ideas translate into new cybersecurity products and services.

    Thirdly, the sector needs to enhance cyber cooperation with different sectors to create more relevant and effective legal instruments. The idea of a Digital Geneva Convention has been brewing since 2017. The premise is that the Digital Geneva Convention would commit governments to adopt and implement norms to protect civilians on the internet, without introducing restrictions on online content, in times of peace. It aims to protect the humanitarian system through modified legal frameworks that can cope with existing and future realities that will include digital protection. It also pushes for increased collaboration with technology companies. Just as the Fourth Geneva Convention recognized that civilian protection required the active involvement of the Red Cross, protection against cyberattacks requires the active assistance of technology companies.

    Humanitarian organisations need to constantly innovate and invest in new solutions to stay ahead of the curve.

    About the Author

    Christopher Chen was, until recently, an Associate Research Fellow with the Humanitarian Assistance and Disaster Relief (HADR) Programme, Centre for Non-Traditional Security (NTS) Studies at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University (NTU), Singapore.

    Categories: RSIS Commentary Series / Country and Region Studies / Cybersecurity, Biosecurity and Nuclear Safety / Non-Traditional Security / Technology and Future Issues / East Asia and Asia Pacific / South Asia / Southeast Asia and ASEAN / Global
    comments powered by Disqus

    SYNOPSIS

    On 3 November 2022, the International Committee of the Red Cross released its report, “Digitalising the Red Cross, Red Crescent and Red Crystal Emblems: Benefits, Risks and Possible Solutions.” It was in response to cyber intrusions the movement faces. As the humanitarian sector integrates digital technologies into its operations, it faces significant cyber risks. How should the sector navigate this increasingly complex space?

    Source: Unsplash

    COMMENTARY

    Humanitarian organisations need to collect and process huge quantities of personal data. While digitalisation improves the effectiveness of responses and operations, it also raises concerns about the risk of cyberattacks on sensitive information.

    Earlier this year, a group of unknown hackers breached the systems of the International Committee of the Red Cross (ICRC) and accessed the personal data of vulnerable populations across the world. This high-profile case is a stark reminder that humanitarian organisations face cyber threats.

    The sector needs to assess current approaches and find robust solutions to safeguard digital assets. The sector is now exploring the use of digital emblems – digital markers or signals to identify protected assets in cyberspace – to enhance protection measures in adapting to the new realities of working in the digital space.

    Cybersecurity in the Humanitarian Sector

    In recent times, coordinated attacks on humanitarian organisations have raised questions about the preparedness of the aid sector in responding to and mitigating risks in cyberspace.

    In January 2022, a cybersecurity company hired by the ICRC discovered that a server containing information related to the International Red Cross and Red Crescent Movement’s Restoring Family Links service was compromised by an unknown group of hackers.

    This exposed the personal data and information of over 500,000 vulnerable individuals, many of whom were separated from their families due to armed conflict, disasters, and migration. The exposed data included names, locations, and contact information collected by at least 60 National Red Cross and Red Crescent Societies around the world.

    This was by no means a unique and isolated incident. In June 2021, hackers launched a phishing attack on humanitarian and development organisations by mimicking the email account of the US Agency for International Development (USAID). Hackers also infiltrated the computer networks of the United Nations in 2019 and in 2021.

    The main issue is that cybersecurity remains underfunded and under-prioritised in the aid sector. While demand increases for data-driven approaches, investment in data protection has not kept pace. Large international NGOs have started to invest in in-house cybersecurity experts and access to technical know-how; however, many of the smaller organisations have less resources and capacities to secure their data.

    Digital Emblems: Opportunities and Challenges

    Under International Humanitarian Law (IHL), the Red Cross, Red Crescent, and the Red Crystal emblems are used to identify and legally protect personnel, units, establishments, and transports in times of armed conflict. Generally, the emblems aim to protect medical services of the armed forces and civilian hospitals in war time. They are used by the National Red Cross and National Red Crescent Societies, the International Federation, and the ICRC.

    Cyber-attacks are now a reality in armed conflict. The ICRC is exploring how the red cross, red crescent, and red crystal emblems can be digitalised and used in the cyber realm to cope with this new dynamic. In practice, digital emblems can be used to mark out protected digital assets – for instance, the personal data files of vulnerable populations found on the ICRC servers – to help avoid erroneous targeting, as well as to signify that they enjoy protection under IHL.

    While there is definite protective value in the use of digital emblems, challenges remain in implementation and doubts exist regarding their effectiveness. At an ICRC Expert Meeting in 2020, it was highlighted that marking an asset with a digital emblem runs the risk of identifying it as a ‘soft target’ to malicious actors, which ironically makes the asset more easily and systematically targeted.

    As IHL is only applicable during times of armed conflict, situating digital emblems under its ambit might not necessarily increase its protective value in times of peace and normalcy. Furthermore, the physical emblems were created specifically to protect medical assets; transferring this protection to non-medical assets is problematic as it requires the restructuring of current humanitarian legal frameworks.

    Tackling Challenges in Cyberspace: Lessons from Singapore

    The use of digital emblems shows how the humanitarian sector is trying to enhance its security by adapting to new threats in the digital space. But, more than such piecemeal initiatives, what is required is system-wide investment and reform, specifically with regard to cybersecurity and resilience.

    To tackle challenges in the digital space, the aid sector can learn from national governments and the private sector that have demonstrated experience in cybersecurity. The Global Cybersecurity Index 2020 ranks Singapore fourth globally and  first in the Asia-Pacific region when it comes to cybersecurity. Singapore’s Cybersecurity Strategy 2021 lays out key pillars and enablers to strengthen the security and resilience of the nation’s digital infrastructure.

    There are a few strategies which can be adopted by the humanitarian sector.

    Firstly, humanitarian organisations need to build resilient infrastructure. This will require stakeholders to support investment in cybersecurity.

    Secondly, humanitarian organisations need to improve in-house capacity to assess, respond to, and mitigate cyber threats. This requires sustained investment in capacity development to help build up a pool of cybersecurity talent and to ensure that research and ideas translate into new cybersecurity products and services.

    Thirdly, the sector needs to enhance cyber cooperation with different sectors to create more relevant and effective legal instruments. The idea of a Digital Geneva Convention has been brewing since 2017. The premise is that the Digital Geneva Convention would commit governments to adopt and implement norms to protect civilians on the internet, without introducing restrictions on online content, in times of peace. It aims to protect the humanitarian system through modified legal frameworks that can cope with existing and future realities that will include digital protection. It also pushes for increased collaboration with technology companies. Just as the Fourth Geneva Convention recognized that civilian protection required the active involvement of the Red Cross, protection against cyberattacks requires the active assistance of technology companies.

    Humanitarian organisations need to constantly innovate and invest in new solutions to stay ahead of the curve.

    About the Author

    Christopher Chen was, until recently, an Associate Research Fellow with the Humanitarian Assistance and Disaster Relief (HADR) Programme, Centre for Non-Traditional Security (NTS) Studies at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University (NTU), Singapore.

    Categories: RSIS Commentary Series / Country and Region Studies / Cybersecurity, Biosecurity and Nuclear Safety / Non-Traditional Security / Technology and Future Issues

    Popular Links

    About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersVideo/Audio ChannelRSIS Intranet

    Connect with Us

    rsis.ntu
    rsis_ntu
    rsisntu
    rsisvideocast
    school/rsis-ntu
    rsis.sg
    rsissg
    RSIS
    RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    Getting to RSIS

    Nanyang Technological University
    Block S4, Level B3,
    50 Nanyang Avenue,
    Singapore 639798

    Click here for direction to RSIS

    Get in Touch

      Copyright © S. Rajaratnam School of International Studies. All rights reserved.
      Privacy Statement / Terms of Use
      Help us improve

        Rate your experience with this website
        123456
        Not satisfiedVery satisfied
        What did you like?
        0/255 characters
        What can be improved?
        0/255 characters
        Your email
        Please enter a valid email.
        Thank you for your feedback.
        This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
        OK
        Latest Book
        more info