Scroll to top
Security for Post-Conflict Reconstruction Workers | CloseProtectionHire

Security Intelligence

Security for Post-Conflict Reconstruction Workers | CloseProtectionHire

Security planning for post-conflict reconstruction and development contractors in Iraq, Libya, Ukraine, and fragile states. UNDSS, MOSS standards, and field protocols. Enquire today.

12 May 2026

Written by James Whitfield, Senior Security Consultant

By 2004, the Coalition Provisional Authority in Iraq had disbursed over USD 18 billion in reconstruction contracts. The security environment for workers on those contracts was deteriorating rapidly. The first year of large-scale reconstruction activity coincided with the emergence of insurgent groups targeting foreign workers, contractors, and the infrastructure they were rebuilding.

The Bremer Wall – the blast barrier that defined the Green Zone perimeter – became the visible symbol of a security calculus that reconstruction planners had not fully accounted for: that the presence of reconstruction activity itself generated threat, that the economic interests associated with major infrastructure projects attracted armed actors, and that the international visibility of reconstruction workers made them targets in a way that had not been standard in earlier development contexts.

Post-conflict reconstruction security is not a subset of NGO security or of general contractor security. It is a distinct discipline with its own threat drivers, governance frameworks, and operational requirements.

The Threat Environment in Post-Conflict Settings

The assumption that a ceasefire or peace agreement reduces security risk is consistently contradicted by the evidence. The post-conflict phase introduces a specific threat profile:

Residual armed groups: In most post-conflict transitions, not all armed factions disarm. Former combatants with weapons and limited livelihood options represent a persistent threat. In Iraq after 2003, Libya after 2011, and in the eastern Ukraine context from 2014 through 2022, significant armed group activity continued for years after the formal cessation of major hostilities.

Organised crime expansion: Security vacuums created by the collapse of state institutions allow organised crime to fill economic space. Reconstruction projects – with their large procurement budgets, equipment, fuel stores, and cash flows – are primary targets. The UN Office on Drugs and Crime documented in its 2010 report on organised crime in post-conflict states that criminal networks in Afghanistan, Kosovo, and Sierra Leone had specifically targeted reconstruction supply chains.

Kidnap for ransom: International reconstruction workers represent a different kidnap profile than local employees. In Iraq between 2004 and 2010, over 300 foreign nationals were kidnapped, according to Iraq Body Count’s tracking of recorded incidents. Control Risks’ Global Kidnap Report data for sub-Saharan Africa and the Sahel shows that international reconstruction and development staff remain a primary target category.

Project-specific threat: Some reconstruction projects generate opposition from actors who benefit from the pre-reconstruction status quo – armed groups with economic interest in a non-functional power grid, factional actors who oppose the political outcome represented by a specific infrastructure project. This project-specific threat requires specific analysis. It cannot be adequately addressed by generic country-level threat assessments.

Governance Frameworks

UNDSS and MOSS

The UN Department of Safety and Security was established in 2005, consolidating the UN’s previously fragmented security management. UNDSS publishes Minimum Operating Security Standards for each country in which the UN operates. MOSS defines:

  • Communications requirements (primary and backup communications, satellite phone requirements for field operations, reporting protocols)
  • Vehicle standards (roadworthiness, first aid and emergency equipment, communications fit)
  • Staff training requirements (FSM, HEFAT, first aid)
  • Incident reporting obligations

For reconstruction contractors working alongside or under UN operational frameworks, MOSS represents the baseline standard against which arrangements may be assessed. UNDSS published the current Framework of Accountability in 2011. It is explicit that security management is a leadership responsibility – it cannot be delegated entirely to a security manager.

InterAction Security Unit

InterAction, the US-based alliance of international NGOs, operates a Security Unit that publishes guidance specifically for implementing organisations. Its Minimum Operating Security Standards for non-governmental organisations pre-dated the UN MOSS framework and informed its development. InterAction’s guidance is used extensively by USAID implementing partners.

Donor Requirements

USAID’s Administrative Instructions on Staff Safety and Security (ADS Chapter 490) require implementing organisations to have a documented security management system, staff trained to HEFAT standard for deployment to high-threat environments, and an incident reporting system. FCDO’s equivalent requirements are contained in its Security and Duty of Care Guidance for Implementing Partners. The European Commission’s ECHO has comparable requirements for humanitarian implementing partners.

These requirements are not advisory. Failure to demonstrate compliance is grounds for grant suspension or contract termination.

INSO and Context-Specific Briefings

The International NGO Safety Organisation operates in over 30 active and post-conflict environments, providing real-time security briefings, incident tracking, and analysis to registered NGOs and increasingly to reconstruction contractors. INSO’s country-specific security briefings are one of the most practically useful intelligence products available to organisations operating in contexts like South Sudan, the Central African Republic, Mali, and the DRC.

INSO also provides training – including security management for senior staff and HEFAT courses. In environments where INSO operates, registering with the organisation and participating in its information-sharing network is a standard expectation. An organisation operating in an INSO country without registering is operating without access to a significant intelligence resource.

Supply Chain Security

Construction projects in post-conflict environments generate large supply chains: cement, steel, fuel, heavy equipment, electrical materials. Each element of that supply chain is a potential target and a potential vector for corruption.

Fuel is the primary target. In Afghanistan, the US Special Inspector General for Afghanistan Reconstruction (SIGAR) documented in multiple audit reports between 2010 and 2020 that fuel intended for reconstruction projects was routinely diverted – sometimes to the insurgent groups the projects were intended to counter. The diversion was possible because fuel storage was insufficiently controlled and local procurement relationships were not adequately vetted.

Supply chain security for reconstruction requires:

Supplier vetting: Background checks on local suppliers and their beneficial ownership, consistency with sanctions lists (OFAC, UN, EU), and assessment of any relationships with armed groups or politically exposed persons.

Logistics controls: GPS tracking on fuel tankers and equipment vehicles, controlled fuel stores with access logs, and two-person authorisation for significant disbursements.

Cash management: Cash disbursements for local labour and materials are a high-risk activity. Payment systems that reduce the need for large cash holdings – mobile money where available, bank transfer systems where infrastructure permits – reduce both theft risk and the project’s profile as a cash target.

Community Liaison as a Security Function

In Iraq, Afghanistan, and Libya, the reconstruction projects that sustained the most sustained hostile attention were those perceived by local communities as benefiting external actors rather than local populations. Community opposition – even where it fell short of active collaboration with hostile actors – reduced the flow of intelligence about approaching threats and created conditions in which hostile actors could operate without community challenge.

Community liaison is not a public relations function – it is a security function. Structured engagement with community leaders, transparent communication about project benefits, employment of local staff where possible, and responsiveness to community concerns about project impacts all contribute to the community acceptance that reduces targeting.

UNDSS, InterAction, and the FCDO’s operational guidance all include community liaison as a component of security risk reduction. The principle is sometimes called “acceptance-based security” – the idea that a project accepted by the community it operates in is protected by that community’s interest in its success.

Integration with Close Protection Services

Senior project personnel on post-conflict reconstruction operations – project directors, chief engineers, financial controllers – typically require individual close protection when the threat level warrants it. This is distinct from the project’s overall security management system and should be planned in conjunction with it.

Close protection services for reconstruction environments differ from corporate close protection in several respects:

Integration with project security: The close protection officer is operating within a larger security system that includes static guards, convoy protocols, communications networks, and incident reporting chains. They need to understand and operate within that system rather than alongside it.

Vehicle and convoy operating procedures: Movements are typically by convoy rather than single vehicle. The close protection officer’s role in a convoy context is defined by the convoy security operating procedures – including what happens if the convoy comes under attack, is stopped at an illegal checkpoint, or has a vehicle breakdown.

Medical capability: HEFAT-standard first aid is the minimum for an environment where medical facilities may be rudimentary. Close protection officers in reconstruction environments should carry individual first aid kits capable of managing life-threatening trauma until evacuation is possible.

For operations in active post-conflict environments, see also security for NGO and development workers and hostile environment security planning.

Summary

Key takeaways

1
1
Post-conflict does not mean post-threat

Iraq in 2004-2008, Libya after 2011, and Ukraine from 2022 onwards all demonstrated that the reconstruction phase carries a distinct threat profile. Kidnap for ransom, armed robbery of project assets, targeted attacks on project personnel seen as politically or economically threatening, and factional violence spilling over into reconstruction zones are recurring patterns.

2
2
MOSS compliance is the baseline, not the standard

MOSS sets the minimum required for UN-system operations. It is not calibrated to the specific threat facing a commercial reconstruction contractor, whose risk profile may differ significantly from a UN programme. A risk-based security assessment specific to the project, location, and implementing organisation is required on top of MOSS alignment.

3
3
Supply chain security is as important as personnel security

Reconstruction projects are targeted for their supply chains -- fuel, equipment, materials, and cash. Diversion of project resources funds armed groups and criminal networks. Supply chain security -- vetting local suppliers, controlling fuel stores, managing cash disbursements -- is integral to the project's security management system, not an afterthought.

4
4
Community relations are a security function

In post-conflict environments, local community acceptance of a reconstruction project is one of its most significant protective factors. Projects that visibly benefit local communities, employ local labour, and maintain transparent communication with community leaders are less likely to be targeted than projects seen as extractive or exclusionary. Security management should include community liaison as a structured activity.

5
5
Donor compliance requirements define the minimum security investment

USAID, FCDO, and the European Commission's ECHO all require implementing organisations to demonstrate adequate security management as a condition of funding. The FCDO's Security and Duty of Care guidance and USAID's Administrative Instructions on Staff Safety and Security set specific requirements. Failure to meet them is a compliance issue, not just a security one.

FAQ

Frequently Asked Questions

MOSS – Minimum Operating Security Standards – are the UN’s baseline security requirements for staff operating in a given country or region. Published by UNDSS (UN Department of Safety and Security), MOSS sets minimum requirements for communications, vehicle safety, staff training, and incident reporting. Non-UN organisations operating in the same environments typically align to MOSS as the available benchmark, adapting it to their specific programme and risk profile.

The UNDSS Framework of Accountability (2011) assigns responsibility for security management to heads of UN agencies and, through them, to all staff. It establishes that security management is a leadership function, not a specialist function. For reconstruction contractors, it is the applicable governance framework when working alongside UN operations – and the de facto standard against which security arrangements may be audited.

Post-conflict environments present a different, not reduced, threat. Active hostilities have typically ceased between main parties, but armed groups, organised crime, militia elements, and individuals with grievances toward reconstruction actors are often present and active. Infrastructure projects draw economic interest from criminal networks. International staff represent kidnap and ransom opportunities. The threat is less conventional but more diffuse and harder to attribute.

UNDSS provides the Foundations of Security Management (FSM) course and the Advanced Security Management (ASM) programme. For operational staff, Hostile Environment and First Aid Training (HEFAT) is the industry standard. The INSO (International NGO Safety Organisation) provides context-specific security briefings in over 30 active conflict and post-conflict environments. Most major donors – USAID, FCDO, the European Commission’s ECHO – require HEFAT completion as a condition of deployment.

Reconstruction operations involve physical infrastructure – construction sites, equipment, vehicles, and supply chains – as well as personnel. The security footprint is larger and more visible than for most NGO programmes, and that visibility itself attracts threat. Close protection for senior project personnel operates alongside site security, supply chain security, and convoy protection for equipment and materials – a more complex integrated requirement than straightforward VIP protection.
Get in Touch

Request a Consultation

Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.

Confidential. Your details are never shared with third parties.