Contents related to "Equipment"

  • Drones in Humanitarian Action - A guide to the use of airborne systems in humanitarian crises

    Library Document | September 15, 2017

    This guide provides an in-depth investigation of the use of drones in humanitarian crises.

  • Cameras Vulnerable To Hacking During Skype Calls

    Library Document | April 7, 2017

    Research from the cyber security company Synack detailing a method used by hackers to access any virtual call made via Skype.

  • Security to go: a risk management toolkit for humanitarian aid agencies

    Library Document | March 23, 2017

    This guide provides a simple, easy-to-use guide for non-security experts to quickly set up basic safety, security and risk management systems in new contexts or rapid onset emergency response situations.

  • Holistic Security: A Strategy Manual for Human Rights Defenders

    Library Document | September 2, 2016

    The Holistic Security manual adopts an explicitly 'holistic' approach to security and protection strategies for human rights defenders by integrating and highlighting the interrelatedness of digital security, psycho-social well-being and organisational security processes.

  • A Brief Guide to Asbestos in Emergencies: Safer Handling and Breaking the Cycle

    Library Document | April 18, 2016

    This booklet is a simple and practical guide for transitional settlement and reconstruction practitioners. It aims to provide basic background information on asbestos and its associated health risks. It provides key recommendations for minimising the risks of dealing with asbestos in post-disaster transitional settlement and reconstruction operations and suggests further reading sources for more in-depth technical information.

  • Humanitarian Access and Technology: Opportunities and Applications

    Library Document | February 4, 2016

    This Access Brief explores several technological options organized in three broad areas integral to securing and sustaining humanitarian access: access to information; physical access; and enhancing quality and monitoring resource use.

  • Guide to Safely Using Satphones

    Library Document | December 22, 2015

    This guide provides a comprehensive look at potential uses for satphones in repressive regimes.

  • 📝

    Time for a Humanitarian Black Box?

    News Item | November 23, 2015

    At least sixteen hospitals were bombed in Syria, Afghanistan and Yemen over the past few weeks. Powerful nations carried out the aerial bombing campaigns that damaged infrastructure and killed humanitarian staff and civilians. However, the circumstances are usually disputed. Perhaps it is time the humanitarian community installed black boxes to record such events? This article presents a device that records forensic evidence of what happened where, when and who did it. It is a call to the humanitarian community to take part in generating the evidence that will force states to take their responsibilities in protecting humanitarian work seriously.

  • Crisis communications for charities: a best practice guide

    Library Document | October 20, 2015

    Working with independent comms consultants Champollion and experienced comms experts, Charity Comms has produced a practical guide to creating and implementing a crisis comms plan.

  • 📝

    Security in your pocket: 'Umbrella' a one-stop-shop

    News Item | October 14, 2015

    Humanitarian workers are operating with little digital protection and too often are unprepared to use technology as a means to mitigate their physical risks. While there are a number of digital tools and technology-based resources for the security of humanitarian workers, collectively, they face a number of problems. Aid agencies need a user-friendly, easily accessible tool that delivers simple answers on how to operate safely in any situation.