
Security Intelligence
Security for Remote and Off-Grid Operations
Isolated operations in mining, energy, and infrastructure carry security risks that urban EP frameworks do not address. A senior security consultant examines what remote operations security requires.
Written by James Whitfield
Remote and off-grid operations – mining exploration, oil and gas development, infrastructure construction in rural or wilderness areas, scientific research in isolated terrain – present a security environment that is fundamentally different from urban EP work.
The city security disciplines that protect a principal on a business trip to Lagos or Bogota remain relevant but are insufficient on their own. The threat model is different, the response time is different, and the communications infrastructure is different. This article examines what security for remote operations actually requires.
The Remote Operations Threat Environment
Remote operations face a distinct threat profile shaped by isolation and the value of what is being extracted or built:
Distance from response. In a city, police or private response can arrive in minutes. In a remote mining or exploration area, the nearest security response or medical facility may be hours away by road or air. Every security plan must treat this response time as a design constraint, not an assumption to be overcome.
Community conflict. Resource extraction projects in rural areas operate in communities with an economic, environmental, and cultural relationship to the land being developed. Where that relationship is not managed – through benefit-sharing, consultation, and grievance mechanisms – it frequently manifests as security incidents: access blockades, equipment sabotage, and, in some cases, physical confrontation.
Artisanal mining competition. In active mineral deposits in parts of Africa and Latin America, formal operations frequently overlap with pre-existing artisanal mining activity. The resulting competition over ground – particularly as commodity prices rise – is a consistent source of low-level conflict that can escalate.
Organised crime and kidnap. In parts of the Peruvian, Colombian, and Ecuadorian mining and energy sector, armed criminal groups treat extractive industry operations as revenue sources: payroll robbery, fuel and equipment theft, and kidnap for ransom of technical staff and managers. The UNODC and OSAC document these threats in their annual regional reports.
Environmental hazard as security risk. In wilderness or ecologically sensitive areas, the environment itself is a threat: flooding, rockfall, wildlife, extreme temperature. The security plan for remote operations must integrate with the environmental hazard assessment.
Communications as the Security Backbone
In a remote operation, satellite communications are the security backbone. The reliability of everything else – check-ins, incident reporting, MEDEVAC coordination, extraction – depends on communications that function.
Iridium. The most reliable global satellite communications network for voice and data. Covers the entire globe including polar regions. Low earth orbit constellation means lower latency than geostationary alternatives. Standard for the highest-reliability requirement.
Thuraya. Geostationary satellite covering Africa, the Middle East, Europe, and parts of Asia and Australia. Lower hardware cost than Iridium but with coverage gaps and the inherent limitations of geostationary orbit. Suitable for many remote operations outside the poles.
Inmarsat BGAN. Higher-bandwidth portable terminals capable of voice and broadband data. Heavier and more power-intensive than handset-format Iridium/Thuraya but essential where video, data transfer, or broadband communications are required.
Personal Locator Beacons. PLBs registered to the relevant national maritime or aviation rescue authority (in the UK, the Maritime and Coastguard Agency; in the US, NOAA) should be carried by individuals who may operate beyond the range of radio communication. Activation alerts the relevant rescue coordination centre globally.
Check-in schedules. A formal check-in schedule – defined times at which the field team confirms status to the base, with a defined response protocol for missed check-ins – is not optional. The response to a missed check-in (wait one interval, attempt contact on secondary frequency, initiate search protocol after the third missed window) must be pre-defined, not improvised.
Lone Working and the Buddy System
Lone working in remote environments is the highest-risk operational profile. An individual who is injured, ill, or subject to a security incident with no one else present faces a situation in which their survival depends entirely on their own resources and the response to a missed check-in.
The buddy system – no individual works, travels, or operates alone outside the base perimeter – is the primary control. It is not informal practice. It should be a mandatory procedure with:
- A defined perimeter beyond which the buddy system is required
- Check-in intervals proportionate to the terrain and threat
- A defined response to a missed check-in that does not require management approval before initiating
For operations that require individual movement in remote terrain – field surveys, exploration sampling, site inspection – the buddy system may be resource-intensive. The alternative to providing the resources for a two-person team is accepting the risk of solo remote working. That trade-off should be explicit and documented in the risk assessment, not implicitly assumed.
Medical Evacuation Planning
In remote operations, the security plan and the medical evacuation plan often address the same incident. A vehicle ambush produces trauma casualties. A mining accident produces blast and crush injuries. A community confrontation produces assault injuries.
The critical variable in all of these is time to definitive medical care. If the nearest surgical facility is four hours away, and the standard critical window for penetrating trauma is 60-90 minutes, then the on-site medical capability must be able to sustain life for the evacuation period.
A remote operations MEDEVAC plan requires:
Medical facility mapping. Not the nearest clinic but the nearest facility with surgical capability. The distinction matters – a remote clinic may be able to stabilise a fracture but cannot treat internal bleeding. The plan should identify Tier 1 (field stabilisation), Tier 2 (surgical capability), and Tier 3 (specialist or repatriation hospital) facilities with realistic access times.
Air evacuation pre-contract. For operations where road evacuation time to surgical capability exceeds the critical window for likely injuries, a pre-contracted relationship with an air MEDEVAC provider is standard. International SOS, Global Rescue, and AXA Assistance offer pre-contracted evacuation services. The contract should specify response time commitment, aircraft type available, landing zone requirements, and international coverage.
On-site medical capability. The minimum is a medical kit appropriate to the evacuation time and a team member trained to TCCC or Wilderness First Responder standard. For operations in very remote areas with long evacuation times, a medic or emergency medical technician embedded in the team is worth the cost.
Community Relations as a Security Function
The most cost-effective security investment in a remote extractive or infrastructure operation is usually not more guards or better equipment – it is a community relations programme that prevents security incidents from developing in the first place.
The BHRRC (Business and Human Rights Resource Centre) 2024 analysis of extractive industry conflict incidents found that operations with functioning grievance mechanisms experienced significantly fewer access disruptions than those without. The Voluntary Principles on Security and Human Rights provide a specific framework for extractive industry community engagement as a security function.
This does not mean community relations eliminates security risk. Organised criminal groups that target mining payrolls are not deterred by benefit-sharing agreements. But it means that the security programme is not fighting on two fronts – against external criminal threat and against a hostile local community.
National Staff
In most remote operations, national staff – drivers, guides, interpreters, community liaison officers, technical staff – are the largest proportion of the workforce and often the highest-risk individuals. They live in the community, they are visible targets, and they are typically not covered by international insurance programmes unless explicitly included.
ISO 31030:2021 and the duty of care frameworks that underpin it apply to national staff as they do to international employees. A security programme that provides extraction capability for international staff and leaves national staff to manage a crisis independently is a legal and ethical failure.
Practical provisions: include national staff in the evacuation plan, ensure their insurance coverage includes medical evacuation (or provide equivalent coverage), brief them on the same security protocols as international staff, and create a clear point of contact for them in a security emergency.
For guidance on the broader duty of care framework for international deployments, see our HEAT training guide and country evacuation planning guide. For the mining and extractive industries security environment specifically – including community conflict management, Voluntary Principles compliance, ASM dynamics, and the security framework for junior exploration companies – see our mining and extractive industries security guide. For renewable energy infrastructure in remote locations – wind and solar construction and operational phase security, cable theft, protest management, and SCADA physical security – see our renewable energy infrastructure security guide.
For offshore remote operations specifically – offshore oil and gas platforms, FPSOs and deepwater installations – the Gulf of Guinea piracy threat, North Sea drone and infrastructure targeting, OIM authority structure, helicopter transfer security, and offshore MEDEVAC planning beyond SAR range all require a distinct framework. See our offshore oil and gas platform security guide.
Source: UNODC Global Study on Illicit Financial Flows in the Mining Sector 2024. BHRRC Business and Human Rights in the Extractive Sector 2024. Voluntary Principles on Security and Human Rights Annual Progress Report 2024. ISO 31030:2021 Travel Risk Management. International SOS Duty of Care Survey 2024. OSAC Peru Security Report 2024. OSAC Colombia Security Report 2024. Control Risks RiskMap 2025. FCDO Travel Advisories: Peru, Colombia, DRC, Mali, Myanmar (April 2026).
For organisations with remote supply chain operations – cargo theft mitigation on high-risk road corridors, TAPA FSR warehouse certification, GPS anti-spoofing, and pharmaceutical cold chain security – see our security for supply chain and logistics operations guide. For agri-business and food sector operations at remote agricultural sites in P1 markets – farm attack patterns in South Africa, commodity theft in Nigeria and Kenya, CJNG extortion in Mexico’s agricultural states, counterfeit agrochemical supply chains, and MEDEVAC planning for rural operations – see our security for the agriculture and food sector guide.
James Whitfield is a Senior Security Consultant with 20 years of experience in corporate security, remote operations, and risk management across high-risk environments globally.
Key takeaways
Isolation changes the threat calculus fundamentally
In a city, a security incident can often be resolved in minutes. In a remote location where the nearest emergency service is hours away, the same incident has a different outcome. Every security plan for remote operations must account for response time -- and the plan cannot assume a fast response.
Medical evacuation planning is as important as security planning in remote operations
In remote environments, the security risk and the medical risk are often the same incident. A vehicle ambush, a fall in rough terrain, a snakebite, a sudden illness -- in every case, the critical variable is time to definitive medical care. MEDEVAC planning must be as detailed as the security plan.
Communications infrastructure is both a security control and a vulnerability
In remote operations, satellite communications (Iridium/Thuraya/Inmarsat) are the security backbone. A team that loses communications loses the ability to call for extraction, report an incident, or confirm safety. Redundant communications with independent systems is not optional.
The 'buddy system' is not informal practice -- it is a formal control
Lone working in remote environments is the single highest-risk operational profile. The buddy system -- no individual works or travels alone outside the base perimeter -- must be a mandatory procedure, not a guideline, with defined check-in intervals and defined response to missed check-ins.
National staff security in remote operations is the employer's responsibility
In remote mining, energy, and infrastructure operations, national staff -- drivers, guides, community liaison officers, technical staff -- often face higher risks than international staff and are less likely to be covered by equivalent security and medical evacuation provisions. This is both a legal duty of care failure and an ethical one.
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
