
Security Intelligence
Security for Journalists in High-Risk Environments: Threat Analysis and Protection Frameworks
Journalists face specific security threats that differ from corporate or diplomatic profiles. This guide covers the threat landscape, hostile environment training, digital security, and the security frameworks used by major news organisations.
Written by James Whitfield — Senior Security Consultant
Journalism security sits at a different point on the risk spectrum from corporate executive protection. The client is often a freelancer or small team with limited institutional support. The operating environment may be an active conflict zone. The threat may be directly targeted – state actors or armed groups that specifically want to silence the journalist. And the operational model (small, low-profile, mobile) differs fundamentally from the layered protection that is available to corporate principals.
This article covers the threat landscape for journalists, the security frameworks used by professional news organisations, and the practical measures that apply to both staff and freelance reporters operating in high-risk environments.
The threat picture: Committee to Protect Journalists data
The CPJ’s annual census provides the most reliable count of journalist fatalities. In 2023, 99 journalists were killed. The highest-risk countries were Gaza and Israel (related to the October 2023 conflict), Ukraine, and Mexico. The CPJ distinguishes between confirmed killings (where the connection to journalism is documented) and unconfirmed deaths.
Mexico has appeared consistently in the CPJ top-5 for a decade. The threat is primarily from organised crime, with journalists who cover cartel activity facing systematic targeting. In 2023, Article 19 (a press freedom organisation operating in Mexico and internationally) documented 12 journalist killings, 568 attacks on press freedom, and 37 judicial harassment cases in Mexico alone.
In conflict zones, the deaths split between deliberate targeting, crossfire, and capture. The July 2023 killing of Reuters journalist Issam Abdallah in Lebanon and the deaths of journalists in Gaza throughout the conflict illustrate that proximity to armed conflict carries direct lethality risk regardless of press credentials or visible identification.
Hostile environment training
HEFAT (Hostile Environment and First Aid Training) is a multi-day residential course that provides journalists and support staff with the skills to operate more safely in conflict and high-threat environments. The principal providers include RISC Training, AKE Group, and hostile environment programmes run by BBC, Reuters, and other major news organisations internally.
Core content includes:
Physical security: Movement on foot and in vehicles in high-threat environments. IED and mine awareness (identifying disturbed ground, the danger areas around blast zones, the 4Cs – Confirm, Clear, Call, Cordon). Personal security measures in kidnap-risk environments.
Medical: Trauma first aid – applying a tourniquet to a penetrating limb wound, wound packing for trunk injuries, chest seals for pneumothorax. These are skills designed for the period before professional medical care is available, which in many conflict environments can be hours.
Hostile capture: Behaviour during initial capture (when the risk of violence is highest), communication management, maintaining psychological coherence during detention, and what not to say or do.
Communication: Call-in procedures. What information to give in a distress call. How to communicate location when not sure of it. Use of satellite communication devices where network coverage is unavailable.
HEFAT is now a mandatory requirement for deployment to conflict zones at most major news organisations. The CPJ data consistently shows that journalists without formal hostile environment training are over-represented among conflict fatalities.
Digital security for journalists
The digital threat to journalists is not abstract. Citizen Lab at the University of Toronto has published detailed technical research documenting the deployment of Pegasus spyware against journalists in multiple countries, including Mexico, Saudi Arabia, and India. Pegasus and similar commercial surveillance tools allow operators to remotely access a device’s microphone, camera, files, and communications without the user’s knowledge.
The practical implication is that a journalist covering government corruption or organised crime in a country where these tools are used should treat their primary device as potentially compromised. Source communications on a compromised device expose the source to the same actors the journalist is investigating.
The standard digital security protocol for high-risk journalism:
- Encrypted messaging via Signal for all source communications
- Encrypted email (ProtonMail or OpenPGP) for sensitive correspondence
- Full device encryption on all devices
- A separate, clean device for source communications that does not contain other business or personal data
- A plan for emergency device destruction or wipe if capture or border seizure is imminent – most smartphones can be wiped remotely if prepared in advance
Border crossings are a specific risk. Several countries, including some that are not categorised as high-risk journalism environments, have border policies that allow device search and extraction. Journalists crossing borders in these jurisdictions should carry travel-only devices with no sensitive data, with full remote wipe capability.
The fixer problem
Local fixers, translators, and drivers are the most under-protected participants in international conflict journalism. They are essential to the operation. They navigate the journalist through local political and social geography that no foreign reporter can fully understand. They manage relationships and interpret cultural context. And they do so at greater personal risk than the foreign journalists they support, with weaker institutional protections.
The foreign journalist departs. The fixer remains in country. Reprisals against fixers for their cooperation with foreign media are documented. In Syria, Iraq, and Afghanistan, fixers who worked with Western media faced direct targeting after the journalists they supported departed.
Responsible deployment means: adequate insurance for the fixer (covering medical evacuation and death benefits), a security briefing before the assignment, clear protocols for communication and check-in, and emergency extraction support if the fixer faces a direct threat arising from their work.
The Rory Peck Trust provides support specifically for freelance journalists and their support staff. CPJ provides emergency assistance and advocacy. Neither replaces the primary obligation of commissioning editors and news organisations to the people on the ground who make the journalism possible.
When to use professional security support
Most journalism in high-risk environments does not involve close protection in the executive sense. The operational model does not suit it: a high-profile protection vehicle and uniformed security presence would undermine the journalism and potentially increase the risk.
Exceptions where professional security support is appropriate:
- A journalist with a specific, documented threat against them personally
- Movements into areas with active gang or armed group control where a guide with local relationships is essential to access and safety
- Multi-day operations in kidnap-risk environments where the protocol requires more than a small team can manage independently
- News organisation asset movements (equipment, personnel) through environments where armed escort is documented operating practice
For information on security services in the cities where journalist security risk is highest, see our profiles of Mexico City, Lagos, and Bogota. For close protection services that cover non-standard operational profiles, see our executive protection page.
Key takeaways
HEFAT is the non-negotiable baseline for conflict zone reporting
Digital security for journalists is source protection, not just self-protection
Fixers are the most under-protected participant in conflict journalism
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
