Abyrint Logo abyrint.
Dispersed data sources converging over a map of a conflict zone.

Monitoring in Conflict Zones

Published on: Sun Jun 01 2025 by Ivar Strand

Eyes and Ears on the Ground: The Unique Challenges of Monitoring in Conflict Zones

Introduction

Monitoring development and stabilisation programmes is a cornerstone of effective intervention. It provides the data needed for accountability, learning, and adaptive management. However, applying standard Monitoring and Evaluation (M&E) frameworks to Fragile and Conflict-Affected (FCV) situations is a frequent and critical error. The assumptions of stability, access, and reliable data on which most results-based frameworks depend do not hold.

In this paper, we discuss the unique challenges of monitoring in these environments. We argue that effective monitoring in FCV settings is not a technical exercise in data collection, but an analytical practice of sense-making that must be directly integrated with security and political analysis.

The Mismatch of Standard M&E in FCV Contexts

The archetypical M&E framework, built on a logical model of inputs, outputs, and outcomes, presumes a degree of predictability. It assumes that a programme can be implemented more or less as planned and that the primary challenge is to measure progress against pre-defined indicators.

This model breaks down in conflict environments. The context is defined by non-linear dynamics, exogenous shocks, and the consistent presence of actors who may actively work against a programme’s objectives. A project plan is less a roadmap and more a statement of intent, subject to constant revision. Thus, a monitoring system focused solely on verifying progress against a static plan becomes obsolete quickly.

The Core Challenges

At Abyrint, we have worked on programme design and oversight in numerous conflict-affected regions. We find the challenges to effective monitoring consistently fall into three main categories.

1. The Challenge of Security and Physical Access The most immediate challenge is physical access. Programme sites may be intermittently or permanently inaccessible due to active hostilities, shifting frontlines, checkpoints, or generalized criminality.

2. The Challenge of Political and Social Complexity Monitoring in FCV settings is not a politically neutral act. The collection and perceived use of information can have significant, unintended consequences.

3. The Challenge of Data Reliability Even when access is possible, the integrity of the data collected is often questionable. Standard survey and data collection methods face immense hurdles.

A More Viable Framework for FCV Monitoring

A pragmatic approach is required—one that accepts these constraints and is designed for them. It prioritizes usefulness and risk management over methodological purity. We suggest a framework built on four key pillars.

Exhibit A: A Triangulation Model for FCV Monitoring

To compensate for the unreliability of any single data source, we rely on a structured triangulation of information from three distinct channels:

  1. Remote Monitoring: Using satellite imagery, social media analysis, and other technological tools to verify activities (e.g., confirming a school building is still standing).
  2. Local Network Intelligence: Systematically gathering qualitative insights from a trusted, well-managed network of local partners and community contacts.
  3. Limited Direct Observation: Conducting targeted, high-impact field visits when and where security permits, focusing on verification and problem-solving, not routine data collection.

The Four Pillars of the Framework:

  1. Redefine the Purpose: The primary purpose of monitoring in FCV settings is not accountability against a static plan. It is to inform adaptive management. The key question is not “Did we do what we said we would do?” but rather, “Given the changes in the context, is what we are doing still the right thing to do?”

  2. Employ Triangulation: Relying on a single source of information is untenable. The key is to systematically cross-reference and triangulate data from the three channels described in Exhibit A. If remote sensing shows a road is clear, local contacts report normal commercial activity, and a partner confirms a delivery, we can have a high degree of confidence.

  3. Integrate Security with Programmatic Monitoring: These functions cannot be siloed. A security report about a new checkpoint is a critical piece of programmatic data; it directly impacts logistics and delivery timelines. Likewise, a programme report about community tensions is vital security intelligence. This requires integrated teams and reporting structures.

  4. Uphold an Uncompromising Duty of Care: The safety of staff, partners, and beneficiaries must be the paramount consideration. This means that data collection protocols must include a risk assessment, and that the decision to not collect certain data due to risk is a valid and necessary programmatic choice.

From Data Collection to Sense-Making

Monitoring in conflict zones is not a straightforward technical exercise. Attempting to impose rigid, conventional M&E systems is ineffective and can create unacceptable risk.

The key idea is to move beyond mere data collection toward a disciplined process of sense-making. This requires a flexible and resilient framework that triangulates information from multiple sources, fully integrates security analysis, and empowers managers to make judgements in ambiguous, high-stakes environments. Ultimately, the value of a monitoring system in a conflict zone is measured not by the volume of its data, but by its ability to inform sound decision-making under pressure.