How to Handle Leaks in Communities During Crises and Disasters


During crises and disasters—natural disasters, pandemics, civil unrest—communities become lifelines. Members share critical information, seek support, and coordinate help. But these same conditions create extreme leak risk: heightened emotions, urgent information sharing, and potential exploitation by bad actors. Leaks during crises can have immediate life-or-death consequences. This article provides a framework for handling leaks in communities operating under crisis conditions.

! crisis = heightened leak risk

When every leak matters

Why leaks are different during crises

Crises create unique conditions that elevate leak stakes:

  • Life-or-death information: Leaked information may include evacuation routes, shelter locations, or safety protocols. Inaccurate or stolen information can cost lives.
  • Vulnerable members: Crisis-affected members are already traumatized. A leak can compound trauma.
  • Rushed sharing: In emergencies, members share quickly without normal caution.
  • Bad actors: Crises attract those who exploit chaos—scammers, looters, malicious actors seeking to cause panic.
  • Media scrutiny: Crises attract media attention. Leaks can become headlines, amplifying harm.
  • Infrastructure strain: Platforms may be overwhelmed, making leak response slower.
  • Information fog: In rapidly evolving situations, it's hard to know what's accurate and what's leak-worthy.

These conditions require crisis-specific protocols.

Information accuracy vs. speed

Crises create tension between sharing quickly and sharing accurately:

The dilemma:

  • Members need information fast—delays can be dangerous.
  • But unverified information can cause panic or lead people into danger.
  • Leaks of unverified information can spread rapidly, causing harm before correction.

Strategies:

  • Verified sources: Designate trusted members or moderators as verified information sources during crises.
  • Clear labeling: Require labeling of unverified information: "UNVERIFIED - Please treat with caution."
  • Information hierarchy: Create pinned posts with official, verified information. Encourage members to check there first.
  • Slow down leaks: Encourage members to pause before sharing crisis information externally. "Check with moderators before sharing."
  • Rapid correction: Have systems to quickly correct misinformation before it spreads as leaks.

Crisis-specific prevention measures

During crises, enhance prevention with these measures:

  • Activate crisis protocols: Have pre-planned crisis protocols ready to activate.
  • Increase moderation: Bring in additional moderators during crisis periods.
  • Restrict new memberships: Temporarily limit new memberships or require approval to prevent bad actors from joining.
  • Limit sensitive channels: Make some channels read-only or restrict access to trusted members during peak crisis.
  • Prominent warnings: Display clear warnings: "During this crisis, please be extra careful about what you share and where."
  • Encourage internal reporting: Remind members to report suspicious activity or potential leaks.
  • Technical protections: Temporarily increase technical protections (e.g., disable copying in sensitive channels).

Protecting vulnerable crisis-affected members

Crisis-affected members are particularly vulnerable:

  • Trauma-informed approach: Recognize that crisis-affected members may be in shock, traumatized, or struggling to cope.
  • Extra privacy protection: Be especially careful with information about crisis-affected members—locations, needs, personal details.
  • Resource sharing caution: When sharing resources (shelter locations, aid contacts), consider whether publicizing could overwhelm or endanger those resources.
  • Support channels: Create private support channels for crisis-affected members where they can share needs safely.
  • Check-ins: If safe and appropriate, have moderators check in privately with vulnerable members.
  • Respect capacity: Crisis-affected members may not have capacity for complex privacy decisions. Be protective on their behalf.

Leaks vs. misinformation during crises

During crises, leaks and misinformation often intertwine:

  • Leaked misinformation: Someone may leak information that's false, causing panic.
  • Misattributed leaks: Accurate information may be dismissed as "just a leak" and ignored.
  • Weaponized leaks: Bad actors may create and leak false information deliberately to cause chaos.

Response strategies:

  • Verify before responding: Don't assume leaked information is false—or true. Verify through trusted sources.
  • Correct misinformation leaks: If false information is leaking, correct it publicly and clearly.
  • Source identification: Try to identify the source of misinformation leaks. They may be malicious actors.
  • Educate members: Remind members to verify information before sharing, especially during crises.
  • Partner with fact-checkers: If available, partner with crisis fact-checking organizations.

Immediate response to crisis leaks

When a leak occurs during a crisis, respond with extreme urgency:

Step 1: Assess immediate danger

Could this leak cause immediate harm? Is anyone's safety at risk? This guides priority.

Step 2: Contact affected members

Reach out to anyone whose safety may be compromised. Offer support and guidance.

Step 3: Remove dangerous content

Work aggressively to remove content that could cause immediate harm—locations, identities, safety-compromising information.

Step 4: Issue corrections if needed

If the leak contained false information that could cause panic, issue clear corrections.

Step 5: Communicate with community

Inform the community about the leak without causing panic. Remind them of safe information practices.

Step 6: Coordinate with authorities

If the leak involves immediate danger, coordinate with relevant authorities.

Coordinating with authorities and aid organizations

During crises, you may need to coordinate with external organizations:

  • Emergency services: If leaks involve immediate danger, contact emergency services.
  • Aid organizations: Coordinate with legitimate aid organizations to ensure accurate information flows.
  • Platform providers: Work with platform providers to prioritize removal of dangerous content.
  • Fact-checking organizations: Partner with organizations that can help verify information.
  • Media: If media contacts you about leaks, have prepared statements that prioritize safety over spin.
  • Other community leaders: Coordinate with leaders of other affected communities to share information and strategies.

You're not alone in crisis response. Build relationships before crises occur.

Learning and strengthening after crisis

After a crisis, conduct a thorough review:

  • Crisis after-action review: What worked? What didn't? How did leaks happen?
  • Update crisis protocols: Incorporate lessons learned into your crisis plans.
  • Member feedback: Gather feedback from members about their experience during the crisis.
  • Team care: Ensure your team processes the crisis experience and receives support.
  • Strengthen relationships: Build on relationships with authorities and aid organizations developed during crisis.
  • Document for future: Create a crisis case study for your team and, if appropriate, share with other community leaders.

Each crisis makes you stronger for the next.

Crises and disasters test communities like nothing else. Leaks during these times can have life-or-death consequences. By understanding the unique stakes, balancing speed with accuracy, implementing crisis-specific prevention, protecting vulnerable members, addressing misinformation, responding with urgency, coordinating with authorities, and learning afterward, you can help your community navigate crises while minimizing harm from leaks. In crisis, your community's safety is literally a matter of life and death.