Appeals & Response Plans
- Tropical Cyclone Sagar - May 2018
- Ethiopia: Floods and Landslides - Apr 2018
- Ethiopia: Floods - Aug 2017
- Ethiopia: Measles Outbreak - May 2017
- East Africa: Armyworm Infestation - Mar 2017
- Ethiopia: Acute Watery Diarrhoea (AWD) Outbreak - May 2016
- Ethiopia: Floods - Apr 2016
- Ethiopia: Floods - Oct 2015
- Ethiopia: Drought - 2015-2018
- Ethiopia: Floods - Oct 2014
Most read reports
- 700,000 people flee conflict to seek safety in Somali region of Ethiopia
- The Crisis Below the Headlines: Conflict Displacement in Ethiopia
- Ethiopia - Council conclusions (19 November 2018)
- World Vision East Africa Region Situation Report | October 1 - October 31, 2018
- President’s Malaria Initiative: Ethiopia - Malaria Operational Plan FY 2019
This overview document presents security incidents that affected aid delivery in 2017. The report is based on incidents identified by Insecurity Insight's monitoring of open sources and reported by Aid in Danger partner agencies using the Security in Numbers Database (SiND) in 2017. It presents analysis of 2,152 NGO-related security incidents for which details were shared or made public. The total number of reported incidents below reflects the willingness of agencies to share information. It is neither a complete count, nor representative.
This monthly digest comprises threats and incidents of violence affecting the delivery of humanitarian assistance. It is prepared by Insecurity Insight from information available in open sources.
Burkina Faso 15 May 2017: In Djahoye town, unidentified perpetrators launched an attack, killing the president of the Village Development Council, and seizing money, food and a motorcycle before fleeing. Source: China
Open sources reported damage to, loss of or the destruction of a wide range of humanitarian infrastructure on 160 occasions between January 2015 and June 2016.
This monthly digest comprises threats and incidents of violence affecting the delivery of humanitarian assistance. It is prepared by Insecurity Insight from information available in open sources. It complements resources that already exist, such as the Aid Worker Security Database, which provides statistics and analysis about attacks against aid workers. All decisions made, on the basis of, or with consideration to, such information remains the responsibility of respective organisations.