
Security Intelligence
Security for UN Agencies and International Organisations | CloseProtectionHire
Security framework for UN agencies and multilateral organisation staff: UNDSS security phases, duty of care, staff security in P1 cities, evacuation protocols, and the distinction from INGO security.
Written by James Whitfield
The United Nations system and its affiliated multilateral organisations operate in some of the world’s most complex security environments, often precisely because their mandates – peacekeeping, humanitarian response, development, refugee protection – require presence in locations that no commercial organisation would choose to enter.
This guide addresses the security framework for UN agencies and multilateral organisation staff, with a focus on the operational context in P1 cities and high-risk field environments where the framework is most frequently tested.
The UN Security Management System
The UN Security Management System (UNSMS) is the framework within which all 44 UN system entities (including the specialised agencies, funds, and programmes) manage staff security. The UNSMS is administered by the Department of Safety and Security (UNDSS), which was established in 2005 following a series of attacks against UN personnel including the August 2003 bombing of the Canal Hotel in Baghdad (22 killed, including SRSG Sergio Vieira de Mello).
The Security Management Team (SMT) in each country consists of the heads of UN agencies in that country, chaired by the Designated Official (DO) – typically the Resident Coordinator. The SMT is responsible for country-level security decisions, including security level declarations.
The Security Level System (SLS), revised in 2019, defines six operational levels:
- Level 1 – Minimal: standard operating conditions with basic security precautions
- Level 2 – Low: specific security awareness and reporting requirements
- Level 3 – Moderate: additional security measures, staff briefings, restricted movement in some areas
- Level 4 – Substantial: significant security restrictions, reduced non-essential presence, increased residential security requirements
- Level 5 – High: minimal presence, most staff relocated or working remotely, essential operations only
- Level 6 – Extreme: evacuate all non-essential personnel; only critical staff in maximum-security conditions
Transitions between security levels are driven by threat assessments produced by UNDSS field security advisors, validated by the Area Security Coordinator, and subject to SMT review.
MOSS (Minimum Operating Security Standards) define the minimum physical, communications, and training requirements for operations at each security level. MOSS requirements include communications equipment (VHF radio, satellite phone, BGAN terminal), residential security (external grilles, intruder alarm, fire safety equipment, 72-hour emergency food and water provision), vehicle standards, and mandatory training (Basic Security in the Field, Advanced Security in the Field, First Aid).
Legal Framework: The 1994 Convention
The Convention on the Safety of United Nations and Associated Personnel (opened for signature December 9, 1994, in force January 15, 1999) obliges states party to:
- Criminalise attacks against UN personnel under their domestic law
- Establish jurisdiction over such offences
- Prosecute or extradite those responsible
The Convention applies to personnel engaged in UN operations, including humanitarian, peacekeeping, and other operations authorised by the Security Council. ‘Associated Personnel’ – individuals employed under contract by the UN, UN consultants, and others directly supporting operations – are covered.
The Convention’s practical value is constrained by the operating environments in which it is most relevant. In DRC, Somalia, Mali, CAR, and Sudan – where attacks on UN personnel are most frequent – the host state’s capacity and willingness to investigate, prosecute, and extradite is limited. The Convention provides a legal framework and supports diplomatic pressure, but it does not substitute for operational security.
P1 City Profiles for UN Operations
Nairobi. The largest UN presence outside New York and Geneva: UNEP and UN-Habitat are headquartered at the UNON (United Nations Office at Nairobi) complex in Gigiri. The UNON complex was hardened following the 1998 US Embassy bombing (which occurred 2km away) and has maintained elevated security posture since the DusitD2 2019 attack (21 killed). UNDSS Kenya maintains a substantial security operation. The current security level for Nairobi reflects the persistent al-Shabaab threat. Staff movement restrictions apply in specific areas of the city, and the terrorism threat assessment requires consistent awareness rather than crisis-mode operating.
Bangkok. ESCAP (UN Economic and Social Commission for Asia and the Pacific) is based in Bangkok, along with significant UNHCR, WFP, and UN Women regional offices. The Thai political security environment has been characterised by periodic coups (2006, 2014) and sustained political polarisation. The UNDSS security level for Bangkok reflects the manageable urban crime environment for international staff, with specific attention to political demonstration periods. The 2015 Erawan Shrine bombing (20 killed) demonstrated the terrorism residual risk.
Manila. UNDSS Philippines manages a complex environment. The threat from the NPA (New People’s Army) in rural Luzon and Mindanao, the BIFF and ASG in Mindanao, and urban crime in Metro Manila all require a tiered geographic security approach. The UN presence in Manila (ILO, UNICEF, FAO, WFP regional offices) is concentrated in Makati and BGC, which have a lower crime environment than the broader metro area. Travel to Mindanao requires specific UNDSS authorisation and security arrangements.
Karachi. Pakistan’s largest city hosts significant WFP, UNHCR, and IOM presence given the country’s refugee and food security caseload. The Karachi security environment – characterised by targeted sectarian and political violence, gang activity in Lyari and Orangi, and periodic attacks on Western-affiliated targets – requires substantial security measures for UN staff. UNDSS Pakistan applies movement restrictions, mandatory use of armoured vehicles for certain movement categories, and a curfew protocol.
Lagos. The UN presence in Lagos (UNICEF, UNDP, WHO, WFP) operates against a background of kidnapping for ransom, armed robbery, and a police force with limited protective capability. The UNDSS Nigeria security posture reflects the Lagos security environment with specific attention to the airport corridor and the movement of international staff. The Boko Haram and ISWAP threat in northeast Nigeria (UNDSS currently Level 5 for Borno State) requires a completely different security framework from the commercial crime environment in Lagos.
Differentiation from INGO Security
International non-governmental organisations (INGOs) operate in the same environments as UN agencies but with a different security framework. The key distinctions:
Mandatory vs guidance-based standards. UNDSS security directives are mandatory for UN staff. GISF (Global Interagency Security Forum) standards for INGOs are guidance-based. An INGO staff member who assesses their mission’s security framework can choose to exceed GISF standards, but there is no institutional mandate equivalent to UNDSS’s authority.
Status and protection. UN staff have the 1994 Convention protection. INGO staff do not. The ICRC has a distinct protected status under international humanitarian law that applies to ICRC operations. Most INGOs rely on acceptance-based security (community acceptance of their mandate) rather than legal status protection.
Coordination. UN and INGOs in the same operating environment coordinate through the IASC (Inter-Agency Standing Committee) and country-level UNCT/HCT structures. Security coordination happens through UNDSS-facilitated platforms, but INGO participation is voluntary. In many field environments, UN UNDSS assessments and briefings are the primary intelligence resource available to INGOs who lack their own field security capacity.
Locally engaged staff. Both UN agencies and INGOs face the same locally engaged staff security challenge: host country nationals with access to operational plans, personnel schedules, and programme activities are potential vectors for intelligence collection by hostile parties. The UN’s UNDSS has clearer mandatory vetting standards; INGO vetting is more variable.
Duty of Care for Seconded and Short-Term Consultants
UN agencies frequently deploy staff on short-term consultancy contracts, secondment from member state governments, and volunteer programmes (UN Volunteers). The duty of care obligations for these individuals are equivalent to those for regular staff under the UNSMS – MOSS requirements apply regardless of contract type.
The specific security risk for short-term consultants and secondees is that they may not have received adequate security induction before deployment. The Basic Security in the Field (BSITF) e-learning course is mandatory for all UN personnel but is sometimes completed after arrival in the field rather than before. Pre-departure security induction, including a country-specific security briefing, is the appropriate standard.
For the broader humanitarian and NGO security framework – covering acceptance-based security, incident reporting, and field security protocols for organisations without access to UNDSS resources – see our NGO and humanitarian worker security guide. For the evacuation planning methodology that applies to both UN and INGO operations, see our country evacuation planning guide.
Key takeaways
UNDSS sets mandatory security standards that UN staff are legally obligated to follow
Unlike INGO security frameworks which are guidance-based, UNDSS directives are mandatory. UN staff who violate UNDSS restrictions -- for example, travelling to an area restricted under the current security level -- do so at their own risk and may face disciplinary consequences. The mandatory nature of the framework is also a source of tension with programme delivery when security restrictions limit operational access.
The 1994 Convention provides legal protection but depends on host state enforcement
The Convention on the Safety of UN Personnel requires states to criminalise attacks on UN staff. In the operating environments where attacks on UN personnel are most common -- DRC, Mali, Somalia, Sudan, CAR -- the host state's willingness and capacity to enforce this obligation is limited. The Convention is a legal framework, not an operational protection.
Nairobi is the highest-complexity UN security environment outside active conflict zones
With the UNEP/UN-Habitat/UNON complex and significant UN operational presence, Nairobi combines a complex urban crime environment with a documented and sustained al-Shabaab terrorism threat against Western and UN-affiliated targets. It is not an emergency operating environment, but it requires consistent operational security discipline that staff transitioning from Western headquarters postings sometimes underestimate.
Locally engaged staff at UN missions face the same insider threat considerations as diplomatic missions
UN locally engaged staff who have access to operational plans, personnel movements, or sensitive programme activities create the same vetting and monitoring challenges as LES at diplomatic missions. In environments where local authorities are themselves a potential threat to UN operations, standard host country background checks are insufficient.
Security hibernation and safe haven activation require pre-planning and regular rehearsal
The UNDSS hibernation protocol -- requiring staff to remain in approved secure locations pending evacuation or resolution of a security event -- depends on staff knowing where to go, how to communicate, and what resources are in the safe haven. Regular rehearsal and refreshed staff briefings are essential; a hibernation plan that has not been rehearsed is not operationally reliable.
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
