Resources
This report explores third-party monitoring (TPM) in insecure environments, with lessons from Afghanistan, Somalia, and Syria.
It highlights TPM's strengths in data collection where access is limited and addresses challenges like data quality and security risks. The report offers practical recommendations for M&E practitioners working in fragile and conflict-affected settings.
This report explores the role and challenges of third-party monitoring (TPM) in conflict-affected and volatile environments. Part of the Secure Access in Volatile Environments (SAVE) research programme, the report draws on interviews with agencies and service providers, documenting the use of TPM by humanitarian organisations in Afghanistan, Somalia, and Syria. It evaluates the strengths and limitations of TPM and offers recommendations for improving its effectiveness in insecure settings.
Key features
- Strengths of third-party monitoring (TPM): TPM allows organisations to gather essential data in areas where direct access is restricted due to insecurity. It provides a way to validate partner reports, monitor field activities, and conduct more frequent data collection in "no-go" zones. In cases like Afghanistan and Syria, TPM was instrumental in monitoring distributions and infrastructure projects when in-country staff were unable to access the field.
- Challenges and risks: The report highlights several challenges, including the inconsistent quality of TPM data, potential conflicts of interest, and the high costs and time investments required. There is also a risk of reduced institutional memory when agencies rely too heavily on TPM instead of building internal monitoring capacities.
- Ethical and security concerns: TPM providers face significant risks, including physical harm in conflict zones. The report discusses the ethical implications of transferring risks from agencies to TPM providers and the lack of adequate security protocols in some cases.
- Lessons and recommendations: Successful TPM requires significant investment in selecting and training providers, as well as regular reassessment of TPM systems. The report advocates for a balanced approach, where TPM complements rather than replaces internal monitoring efforts. Agencies are encouraged to adopt clear communication strategies and community feedback mechanisms to maintain transparency and accountability.
How would you use the resource?
This resource is relevant for M&E practitioners and humanitarian agencies operating in fragile and conflict-affected contexts. It provides insights into the practicalities of using TPM to gather data in insecure environments and highlights the importance of investing in provider training and ensuring data quality. M&E teams can apply the lessons and recommendations from this report to enhance their TPM systems, ensuring that monitoring remains effective and ethically sound.
Why are we recommending it?
This resource is recommended for its comprehensive analysis of TPM in volatile environments, offering practical guidance for managing TPM effectively. The lessons from Afghanistan, Somalia, and Syria provide valuable insights for agencies operating in similar insecure contexts, where direct access to field sites is limited but monitoring remains essential.
Sources
Sagmeister, E., & Steets, J., with Derzsi-Horváth, A., & Hennion, C. (2016). The use of third party monitoring in insecure contexts: Lessons from Afghanistan, Somalia and Syria. Global Public Policy Institute.