
Security Intelligence
Security for Gig Economy and Freelance Workers in High-Risk Locations | CloseProtectionHire
Security guidance for freelance and contractor workers deployed to high-risk cities. Covers ISO 31030 duty of care, lone worker protocols, digital security, and MEDEVAC planning.
Written by James Whitfield
Freelance workers and independent contractors now represent a significant share of the workforce deployed to high-risk cities. Technology, journalism, consulting, and NGO-adjacent roles regularly send solo professionals to Lagos, Karachi, Manila, and Nairobi – cities where corporate security infrastructure is essential, not optional. The difference is that those workers frequently have none of it.
This article addresses the specific security vulnerabilities of gig economy and freelance workers operating in elevated-risk environments, and the frameworks that both organisations and individual contractors can apply to manage those risks.
The Duty of Care Problem
The legal foundation matters here. ISO 31030:2021 – Travel Risk Management – sets the international benchmark for how organisations should manage the security of staff they deploy abroad. The standard applies to “workers” broadly, and the key determinant is not employment status but control: if your organisation directed or facilitated the contractor’s deployment, you share responsibility for their pre-deployment security baseline.
Under the UK Health and Safety at Work Act 1974 and the Management of Health and Safety at Work Regulations 1999, an employer’s duty extends to non-employees where work is conducted on the employer’s premises or under the employer’s direction. Clients who instruct freelancers to travel to high-risk environments sit uncomfortably close to that threshold. The distinction between “employee” and “contractor” provides less legal insulation than many procurement departments assume.
For the individual freelancer, the practical implication is this: your client may not cover you, and your platform-provided insurance almost certainly will not cover you in the locations where coverage matters most.
Insurance Gaps in Platform-Based Work
Gig platforms – Upwork, Toptal, and specialist consultancy aggregators – typically provide some form of professional indemnity or personal accident cover as part of their fee structure. That cover is written for low-risk markets. The standard policy from Hiscox and Aon personal accident lines carries blanket exclusions for:
- Countries under FCDO Level 3 (advise against all but essential travel) or Level 4 (advise against all travel)
- War, civil war, and military operations
- SRCC: Strikes, Riots, and Civil Commotion
The SRCC exclusion is particularly relevant in West Africa, Latin America, and South Asia, where civil unrest is the most common security disruption a freelancer is likely to encounter. Standard endorsement to remove the SRCC exclusion is available from specialist brokers – Aon, Willis Towers Watson, and Hiscox all offer it – but it must be purchased before departure.
For medical evacuation, International SOS and Global Rescue both offer annual memberships that cover MEDEVAC from most global locations. Global Rescue’s annual individual plan covers extraction from any point globally at a fixed annual cost. This is a baseline requirement, not an upgrade, for anyone working in cities where hospital capability is limited.
Pattern-of-Life Vulnerability
Corporate travellers benefit from security teams that actively vary routines, select accommodation for its security credentials, and apply counter-surveillance awareness throughout a deployment. Freelancers typically do none of this.
The pattern-of-life vulnerability is a fundamental issue. A solo worker who travels the same route from the same apartment to the same cafe at the same time each morning has, within three days, created an observable, predictable routine. In cities with active kidnap-for-ransom (KFR) operations – Bogota, Lagos, Manila, Mexico City, Karachi – reconnaissance of a target typically precedes an abduction by days or weeks. Predictability is the enabler.
Practical counter-measures at the individual level include:
- Varying departure times by 30-60 minutes in either direction
- Using at least three different routes between accommodation and primary working location
- Avoiding posting real-time location on social media during the assignment
- Not publicising which hotel or apartment you are using
- Checking in from different locations when possible
These disciplines are standard in corporate security deployments. For freelancers, they require active adoption without the infrastructure that normally prompts them.
Digital Security in High-Risk Environments
Freelancers in P1 cities face the same digital security threats as corporate executives, without the IT security backstop. Specific risks include:
Device compromise at borders. Pakistan, Russia, and China all have documented instances of device inspection at ports of entry. The NCSC/FBI/CISA joint advisory on PRC state-sponsored cyber activity (2023) recommends clean devices – devices with no sensitive data or credentials, used only for the specific trip – when travelling to environments where state-level device access is a realistic threat.
Public wi-fi interception. Freelancers often work from cafes, co-working spaces, and hotel lobbies. These networks are unsecured. A VPN is not optional in these environments – it is a minimum baseline. The NCSC’s guidance on public wi-fi strongly recommends treating all such networks as hostile.
Social engineering via LinkedIn and professional platforms. In intelligence-active environments, approaches via LinkedIn from people presenting as potential clients or collaborators are a documented method for collecting information about a target’s schedule, location, and current project. Limit the detail you share about active assignments on professional platforms.
File transmission. Confidential documents – particularly those related to legal, financial, or investigative work – should be transmitted via end-to-end encrypted channels. Signal and ProtonMail are the standard tools for this in high-risk assignments.
The Check-In Protocol
A check-in protocol is the single most important operational tool available to a lone freelance worker. It requires three elements to function:
A named human contact. Not a general inbox, not a family member without a response plan. A named individual who has agreed to the role, understands what to do if a check-in is missed, and has access to the worker’s itinerary and local emergency contacts.
A defined frequency. For assignments in P1 cities, twice-daily check-ins (morning and evening) are the minimum. In lower-risk P2 cities, once-daily check-ins are acceptable. The frequency should be agreed before departure and should not vary without prior notification.
A missed check-in escalation procedure. The protocol should define a threshold – typically two consecutive missed check-ins – before the contact escalates. Escalation should have a defined sequence: attempt contact via all channels, then contact the local embassy or consulate, then contact the client organisation, then contact a specialist response firm if required.
A duress word or phrase – an alternative safe-word that communicates “I am under duress, initiate emergency response” – should be agreed in advance. This allows the worker to communicate compromise without alerting a threat actor who may be present. The duress signal should be a plausible alternate answer: “I’m running late, call you tomorrow” might signal duress if “OK, tomorrow” is the agreed normal response.
Lone Worker Technology
Lone worker devices have improved significantly in the last decade. Two options are most relevant for high-risk assignments:
Garmin inReach. A satellite communicator that functions globally via the Iridium network regardless of mobile coverage. The device allows two-way text messaging and SOS activation, and can share location with a nominated contact in real time. The Explorer Plus model is the standard field choice for security professionals and researchers working in remote or infrastructure-limited environments.
Blackline Safety G7. A cellular and satellite hybrid device with automated man-down detection (fall detection via accelerometer), two-way calling, and a monitoring centre integration. Blackline offers a monitoring service where trained operators respond to alerts and coordinate emergency services. This is the appropriate option for assignments where the worker is not in contact with a dedicated security desk.
For urban P1 city assignments where mobile networks are functional, a checked smartphone app such as TravelTracker (International SOS) or similar provides a lightweight alternative. However, in any environment where mobile coverage is unreliable or the network may be compromised, a satellite-capable device is the more reliable option.
Employer and Client Obligations Under ISO 31030
ISO 31030:2021 specifies a seven-element framework for travel risk management. The elements most relevant to organisations deploying freelancers include:
- Risk assessment before deployment. A country-level assessment, updated in the previous 90 days, covering political stability, crime, terrorism, and medical infrastructure.
- Pre-travel briefing. Written briefing to the worker covering emergency contacts, nearest hospital with surgical capability, evacuation routes, and accommodation security criteria.
- Incident response capability. A defined point of contact for the worker in an emergency, with access to specialist response support (Control Risks, Kroll, or a specialist travel risk management firm).
- Post-deployment review. A debrief covering any incidents and lessons applicable to future deployments.
Many client organisations do not provide any of this to contractors. If you are a freelancer preparing to deploy to a high-risk location and your client has not provided these elements, the most useful action is to request them explicitly. Document the request. If the client declines, you are assuming risk that they have a legal and ethical obligation to share.
Working Across P1 Cities
Specific conditions in key freelance markets:
Lagos. The Eko Atlantic and Victoria Island zones are comparatively manageable for business work. Traffic congestion creates prolonged exposure on any commute. Commuting in an identifiable pattern to these zones from residential areas to the north increases KFR exposure. Use airport-standard vehicles from established operators, not ride-hailing apps for regular commutes. OSAC Nigeria 2024 documents express kidnapping as the primary threat to business visitors.
Mumbai. Lower violent crime than most P1 cities but device security is a consideration for IP-sensitive work. Monsoon season (July to September) disrupts infrastructure significantly and can isolate freelancers in accommodation. Keep a 72-hour supply of medication and maintain working communications backup.
Manila. NBI and PNP capability is limited outside Metro Manila. For freelancers on extended assignments, digital security is the primary concern – DICT and NBI have documented capability for device access on request, and the legal framework for journalist protection is fragile. For investigative work, operate clean devices and apply the check-in protocol rigorously.
Nairobi. Westlands and Karen are the primary working zones for business visitors. Carjacking remains the primary threat to travellers outside these areas, particularly after dark. Use vetted drivers rather than ride-hailing platforms for regular transit. PSRA Kenya requires close protection officers to be licensed; verify your CP operator’s credentials before deployment.
For Organisations: Pre-Deployment Checklist
Before deploying a freelance contractor to a P1 or elevated-risk P2 city, an organisation acting under ISO 31030:2021 should provide or confirm:
- Country risk assessment updated within the previous 90 days
- Emergency contact sheet with local embassy, nearest trauma hospital, and MEDEVAC provider
- Confirmed MEDEVAC insurance coverage or reimbursement arrangement
- Check-in protocol with a named internal contact
- Pre-departure digital security briefing for the specific destination
- SRCC endorsement on any insurance policy covering the assignment
- Written acknowledgement from the contractor confirming they have received and understood the above
This is not a comprehensive security programme. It is the minimum defensible baseline that demonstrates an organisation took the assignment risk seriously.
For detailed duty-of-care frameworks, see our guidance on lone worker security in high-risk cities and security for NGO and humanitarian workers. For location-independent freelancers and contractors working remotely from P1 cities over extended periods – device discipline, untrusted networks, accommodation security, pattern-of-life exposure, and welfare check protocols without an employer support structure – see our security guide for digital nomads and remote workers.
Key takeaways
ISO 31030 applies to contractors
If your organisation deployed the freelancer, ISO 31030:2021 holds you to the same pre-deployment security assessment standard as for employed staff. Ignoring this creates legal and reputational exposure.
Lone worker devices close the monitoring gap
Garmin inReach and Blackline Safety G7 provide satellite-linked distress capability where mobile networks fail. For freelancers in P1 cities or remote field sites, this is the single most cost-effective safety investment.
Platform insurance rarely covers P1 cities
Standard Hiscox and Aon personal accident policies exclude FCDO Level 3 and 4 territories without an SRCC endorsement. Freelancers must audit their cover before departure -- not after an incident.
Routine predictability is the freelancer's primary vulnerability
Without a security team structuring their movement, freelancers settle into observable patterns quickly. Varying departure times, routes, and working locations is an active discipline, not an optional one.
Check-in protocols must have human escalation paths
Automated apps are not enough. A named human contact who knows what to do when check-ins stop is the minimum viable safety net. Without it, the check-in is administrative, not protective.
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
