Risk Assessment and Risk Management: Necessary Tools for Homeland Security



Similar documents
Assessment Profile: Establishing Curricular Categories for Homeland Security Education

National Infrastructure Protection Center

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Subject: Critical Infrastructure Identification, Prioritization, and Protection

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

How To Write A Book On Risk Management

Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach

I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

Statement for the Record by. Dr. Donald M. Kerr. Director, National Reconnaissance Office, Nominee for the Position of

TESTIMONY. Analyzing Terrorism Risk HENRY WILLIS CT-252. November 2005

Viewpoint Paper. Being Vulnerable to the Threat of Confusing Threats with Vulnerabilities*

The Strategic Importance, Causes and Consequences of Terrorism

Terrorist Protection Planning Using a Relative Risk Reduction Approach*

S AN ACT. To codify an existing operations center for cybersecurity.

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Cyber-Insurance Metrics and Impact on Cyber-Security

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

STATE OF MARYLAND Strategy for Homeland Security

Cyber Security Research and Development: A Homeland Security Perspective

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

CBO. Federal Funding for Homeland Security: An Update. What Is Homeland Security?

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

One Hundred Thirteenth Congress of the United States of America

Billing Code: Guidance Concerning the National Security Review Conducted by the Committee

The Physical Protection of Critical Infrastructures and Key Assets

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

National Cyber Threat Information Sharing. System Strengthening Study

No. 33 February 19, The President

Relationship to National Response Plan Emergency Support Function (ESF)/Annex

Statement. National Association of Mutual Insurance Companies. to the. United States House of Representatives. Committee on Financial Services

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.

Preventing and Defending Against Cyber Attacks November 2010

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary

How To Write A National Cybersecurity Act

Project Risk and Issue Management

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

Lessons from Defending Cyberspace

Threat and Hazard Identification and Risk Assessment

BUSINESS CONTINUITY PLANNING

Business Continuity Management Systems. Protecting for tomorrow by building resilience today

HOMELAND SECURITY INTERNET SOURCES

The Commissioning Process For High Risk Project

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

The Comprehensive National Cybersecurity Initiative

A Risk Assessment Methodology (RAM) for Physical Security

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

Research Note Engaging in Cyber Warfare

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE

Establishing A Secure & Resilient Water Sector. Overview. Legislative Drivers

Methods for Assessing Vulnerability of Critical Infrastructure

Risk Management Fundamentals

Preventing and Defending Against Cyber Attacks June 2011

Threat, Risk and Vulnerability Assessment

September 4, appearing before you today. I am here to testify about issues and challenges in providing for

Disaster Preparedness & Response

GAO COMBATING TERRORISM. Issues in Managing Counterterrorist Programs. Testimony

v. 03/03/2015 Page ii

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

During the Clinton administration, the

Oil and Gas Industry A Comprehensive Security Risk Management Approach.

Preventing and Defending Against Cyber Attacks October 2011

How Boards of Directors Really Feel About Cyber Security Reports. Based on an Osterman Research survey

Some Thoughts on the Future of Cyber-security

Business Continuity Planning. Presentation and. Direction

Seaborne Attack Impact at Transportation, Energy, and Communication Systems Convergence Points in Inland Waters

Appendix V Risk Management Plan Template

Performance Indicators for Disaster Recovery

INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

Homeland Security Presidential Directive/HSPD-5 1

How safe is the American homeland?

Business Continuity & Disaster Recovery

Brief Documentary History of the Department of Homeland Security

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

ALASTAIR CLARK EXECUTIVE DIRECTOR, BANK OF ENGLAND

Business Continuity Strategies for the Small Business Market

April 8, Dear Assistant Administrator Stanislaus:

Cyber Security Research and Development a Homeland Security Perspective

Remarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the

S. ll IN THE SENATE OF THE UNITED STATES

Striving for Excellence

Draft 8/1/05 SYSTEM First Rev. 8/9/05 2 nd Rev. 8/30/05 EMERGENCY OPERATIONS PLAN

Observations on OMB s Proposed Risk Assessment Bulletin. Reflections on Terrorism Risk and Homeland Security

Pennsylvania House Veterans Affairs and Emergency Preparedness Public Hearing

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Measuring Software Security

This PDF document was made available from as a public service of the RAND Corporation.

Development of An Analysis Tool For Performing Civil Aviation Security Risk Assessment

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC

Billing Code: 3510-EA

U.S. HOMELAND SECURITY: A LOOK AT THE FY03 HOMELAND SECURITY BUDGET REQUEST


Transcription:

Risk Assessment and Risk Management: Necessary Tools for Homeland Security Paul Rosenzweig and Alane Kochems Regardless of their political beliefs, Americans want to prevent another terrorist attack from occurring in the United States. In the face of increasingly diffuse threats and adversaries asymmetrically pursuing vulnerable targets, the question is how can we best prevent such attacks. Clearly, the United States does not have the extraordinary resources to protect everything, all the time. Therefore, we must allocate our materiel and funding to protect the most critical assets, whether infrastructure or personnel. To assist in prioritizing threats, we must first assess the risks we face and then manage those risks by putting our resources to work in the most effective manner. 1 Indeed, Michael Chertoff, the Secretary for Homeland Security, made exactly this point earlier this year in announcing the principles upon which the reorganization of the Department would be based. He noted that our resources are not unlimited and that tough choices must be made in how they are allocated, using objective measures of risk. Those objective measures, he continued, would be based on three variables: threat; vulnerability, and consequences. Most significantly, Secretary Chertoff set forth how he would prioritize the Department s focus, opting to concentrate first on threats that pose catastrophic consequences even if these targets are somewhat less vulnerable than other, but less consequential, infrastructure. 2 Talking Points To assist in prioritizing threats, we must first assess the risks we face and then manage those risks by putting our resources to work in the most effective manner. Risk assessment takes place in three stages. First is an assessment of near-term threats and an adversary s capabilities. There follows a look at vulnerabilities and how they can be mitigated. Finally, to assist in prioritization, there is a process designed to identify the criticality of various assets the asset s function or mission and how significant it is. The methodology acknowledges an important point too often disregarded by politicians: Risk can only be minimized, not eliminated. The federal government is responsible for preventing terrorist attacks through intelligence gathering, early warning, and domestic counterterrorism. The private sector must take reasonable precautions based on its vulnerabilities to limit the ability for terrorists to exploit its weaknesses. This paper, in its entirety, can be found at: www.heritage.org/research/homelanddefense/bg1889.cfm Produced by the Center for Legal and Judicial Studies Published by The Heritage Foundation 214 Massachusetts Avenue, NE Washington, DC 20002 4999 (202) 546-4400 heritage.org Nothing written here is to be construed as necessarily reflecting the views of The Heritage Foundation or as an attempt to aid or hinder the passage of any bill before Congress.

This sort of analysis may sound academic, but it has real world effects. It leads, for example, to the conclusion that we should focus preventive resources on areas of greater concern, like chemical, biological, or nuclear attack. And it leads as well to the conclusion that the Department of Homeland Security cannot and should not be expected to protect Americans from all possible risks. The recent London bombings illustrate the point. A risk assessment analysis asks what the likely consequences of a similar bombing in New York are, and then asks whether or not any reasonable expenditure of resources can prevent those consequences. The likelihood that resources are better spent elsewhere has generated controversy. But as this paper demonstrates, the methodology that the Department proposes to adopt is the right one for America, and should not be discarded because it establishes politically uncomfortable truths. 12 What Is Risk Management? Risk is uncertainty. It is both the uncertainty that surrounds actual events and outcomes and the uncertainty that surrounds future, potential events. It may, of course, apply to natural events (like the risk from hurricanes) and to non-physical events (like the risk from changes in the financial markets). As relevant to Homeland Security issues, however, risk is more particularly the likelihood that a terrorist threat will endanger or affect some asset. That asset can be an individual (like the President), a structure (like the Pentagon), or even a function (like America s stock exchange system). 3 When one thinks of such risks, one must therefore think of any number of underlying elements that go into an evaluation. These might include: What is the risk (or threat)? What are you trying to protect? What is the criticality? What/who are the potential actors? What are their intentions? What are their relevant capabilities? Where and what are the relevant weaknesses? What are our options to eliminate or mitigate those weaknesses? As is evident, the assessment of risk depends on many multivariate, contextual factors. To lend structure to the assessment, there is the discipline of risk management. Risk management is a systematic, analytical process to consider the likelihood that a threat will harm an asset or individuals and to identify actions that reduce the risk and mitigate the consequences of an attack or event. 4 The methodology acknowledges an important point too often disregarded by politicians: Risk can only be minimized, not eliminated. To lend rigor to the analysis, we try to quantify the risks we experience. Thus, risk may be defined mathematically as probability of the attack occurring multiplied by the probability of success of the attack (or, looked at another way, the inverse probability of failure, interruption, or neutralization) multiplied again by the consequences of the attack 1. This paper is based, in part, on a roundtable held at The Heritage Foundation on February 22, 2005, cosponsored with the Center for Democracy and Technology and the Harvard Belfer Center for Science and International Affairs. The roundtable was an off-the-record discussion and the views contained herein are our own. 2. Michael Chertoff, Second Stage Review Remarks, July 13, 2005, at www.dhs.gov/dhspublic/display?theme=42&content=4596 (October 20, 2005). 3. Though the threats often differ, the response to occurrences of a threat are often very similar. Our response to Hurricane Katrina is similar in nature to what our response might be to a hypothetical destruction of a large dam by terrorists. That fundamental similarity explains why the Federal Emergency Management Agency should remain a part of the Department of Homeland Security. 4. Raymond J. Decker, Homeland Security: A Risk Management Approach Can Guide Preparedness Efforts, testimony before the Senate Committee on Government Affairs, October 31, 2001, p. 7, at www.gao.gov/new.items/d02208t.pdf (March 15, 2005). page 2

(on some arbitrary relative scale). In mathematical terms that is: R= Pa x Ps x C where R is risk; Pa is the probability an attack will be attempted; Ps is the probability of success (or, alternatively 1-Pf, where Pf is the probability of failure); and C is the consequence of the attack). Threat Assessment The probability of an attack includes several separate components. It involves, first, an assessment of near-term threats (based, in part, on things like current intelligence and an analysis of the adversary s intentions). In other words, we ask, based upon what we know, what is the likelihood of activity against a particular individual, asset, location, or function. We then conduct an evaluation of the adversary s capabilities. What can he accomplish with what degree of lethality or effect? Perhaps the biggest change that resulted from September 11 is that we have to fundamentally reassess our adversary s capabilities. When the Soviet Union was the adversary, the capabilities were measured by army divisions and nuclear warheads. Now, they are measured by box cutters. This portion of the assessment is often called the Threat Assessment. Vulnerability Assessment The probability of success (or failure) looks at the other half of the question: What are our vulnerabilities and how can they be mitigated? It involves identifying weaknesses in structures (sometimes physical; more frequently today, cyber structures), other systems, or processes that could be exploited by a terrorist. It then asks what options there are to reduce the vulnerabilities identified or, if feasible, eliminate them. Criticality Assessment The consequences factor is intended to evaluate the effect that will be achieved if the adversary accomplishes his goals. Often the goals will include killing individuals, but they may also include social and economic disruption and psychological effects. Not all consequences can be prevented. So in order to assist in prioritization, there is a process designed to identify the criticality of various assets: What is the asset s function or mission and how significant is it? Nuclear Explosion and Mass Transit Bombings: Two Cases To take this discussion out of the theoretical and into the practical, consider two distinct possible means of terrorist attack: a nuclear suitcase bomb in New York City and a coordinated series of explosive bombs on the New York subway. These two examples illustrate, first, the poles of the criticality/consequences assessment. The subway bombing has what risk managers call thinkable consequences; the consequences of the nuclear explosion are unthinkable ones. The two may be qualitatively distinguished: Thinkable risks have few secondary effects and are geographically and temporally bound. However bad an explosion in the subway, its consequences are complete within hours and confined to a small area. For such risks, the goal is to minimize the single points of failure, cascading effects, and uncertainty by focusing on rapid reconstitution and recovery and building security awareness. In other words, we ask people to watch for unattended bags and we provide first responders to limit the aftereffects. Then we act rapidly to rebuild. Unthinkable risks, by contrast, involve very large loss of life, great damage, and effects that spread over time and space. For unthinkable risks, prevention is the key. The entities involved need to focus on countermeasures. As a secondary factor they need to look at recovery and, where possible, attribution of blame. Efforts must be apportioned between thinkable and unthinkable scenarios. For while the probability of a nuclear explosion is low, the impact is so horrific that we must do everything in our power to stop it. By contrast, one can make efforts to stop mass transit bombings, but the principal goal should be to advance speedy recovery. In an aphorism: Thinkable situations need to be made less terrifying while unthinkable ones are made less likely. Put another way, the virtue of risk assessment methodology is that it frees organizations from page 3

having to rely solely on worst-case scenarios to guide their planning and resource allocation. Worst-case scenarios tend to focus on vulnerabilities, which are virtually unlimited, and would require extraordinary resources to address. Therefore, in the absence of detailed threat data, it is essential that a careful balance exist using all three elements in preparing and protecting against threats. 5 By contrast, vulnerability assessments identify exploitable weaknesses and suggest ways to eliminate or minimize them and criticality assessments are designed to systematically identify and evaluate an organization s assets based on the importance of its mission or function, the group of people at risk, or the significance of a structure. 6 Only when an organization makes all three assessments can it assemble a bird s eye view of the situation. Mangers can then use this perspective to create a risk reduction strategy, which guides resource allocation. Making Risk Management a Reality Who uses risk management tools and to what end are the important questions. Before risk management can be discussed intelligently, the problems surrounding information sharing need to be resolved. Until the right people are getting the right information in the right format and at the right time, risk management tools will be inefficient and ineffective. Somewhat related to information sharing is the need to form public-private partnerships. Since so many potential terrorist targets are in private hands, the federal government and industry need to divide the protection responsibilities. Information Sharing Any risk management system needs to be able to analyze several interdependencies. We live in a complex world with many variables. To understand these variables, there must be trust between data owners and those who want to analyze information to enable sharing. To have effective assessments, one must collect and evaluate as much of the relevant, knowable data as possible. Yet substantial barriers to information sharing now exist. With 85 percent of critical infrastructure in private hands and numerous other public and private potential targets, risk management faces a substantial information sharing challenge. Private entities have no real incentive to participate in a national risk assessment system. Often the disclosure of information will come with significant costs for the private sector entity civil liability, competitor enhancement, and the like. At the same time, the central policy issue surrounding risk management is that of resource allocation: Risk assessment can help to determine which threats are important but decision-makers have to decide where to put funding and resources. Not all threats and vulnerabilities can be mitigated or eliminated. Thus, private sector information providers are often left without any concrete benefit. Their vulnerabilities are assessed as lower level risks and having incurred all of the costs, they get none of the anticipated benefits. To put it prosaically, as one industry representative did (off the record) at a recent conference: What do we get? If I advise the government of a change in circumstances that present a heightened risk, will I get more police protection? Additional drive-bys? If not, what s in it for me? Information sharing is also dependent upon the correct liability framework. Risk management deals in possibilities and probabilities. An analysis tool is only as good as the inputted information. But the potential for liability discourages users from sharing information or doing analysis for fear that, despite their best efforts, they will not be able to stop a terrorist act. Liability caps encourage the use of tools that can improve decision-making while not punishing managers who use such tools if a terrorist attack still occurs. Defining the Private Sector s Role It is not the job of the private sector to defeat terrorists. It is the responsibility of the federal government to prevent terrorist acts through intelligence gathering, early warning, and domes- 5. Ibid., p. 3. 6. Ibid., p. 1. page 4

tic counterterrorism. However, it is the private sector s duty to take reasonable precautions, in much the same way as society expects it to take reasonable safety and environmental measures. The federal government has a role in defining what is reasonable, as a performance-based metric and in facilitating information sharing that enables the private sector to perform due diligence (i.e., protection, mitigation, and recovery) in an efficient, fair, and effective manner. We might consider, for example, whether compliance with a federally developed standard ought to be a bar to all private sector liability. Thus, a model public-private regime would: (1) define what is reasonable through clear performance measures, (2) create transparency and the means to measure performance, (3) establish ways for the market to reward good behavior, (4) provide legal protections to encourage information sharing, (5) provide some enhanced governmental benefit as an inducement to participation, and (6) ensure that any fix does not cripple the economic engine that produces the society and liberties Americans enjoy. Using risk management methods may be one of the reasonable activities in which companies can engage. Public Education Finally, since risk management is a widely used tool, education is critical. People need better training on the types of methodologies available and on how to use the technology. They must know the abilities and limitations of their tools including that risk management cannot tell anyone how to prioritize protection. And even more than the users, there is the need for public education. Everyone involved needs to realize that there is no perfect system and that any reasonable attempt to allocate resources should improve the probability of preventing an attack. In short, we need to advance to a culture in which we acknowledge the realities of risk. Instead of reacting to the obvious difficulty in defending a mass transit system by yelling at the messenger and throwing more money at the problem, our political system needs to accept that all risks are not avoidable and that sometimes the costs are not worth the benefits. Conclusion The federal government is responsible for preventing terrorist attacks through intelligence gathering, early warning, and domestic counterterrorism. The private sector must take reasonable precautions based on its vulnerabilities to limit the ability for terrorists to exploit its weaknesses. The federal government needs to clearly define what are reasonable actions for the private sector and address liability issues. Risk management is one tool for determining where risks and vulnerabilities are. It cannot tell someone, however, how to prioritize targets. It just provides an analysis of strengths and weaknesses so a person can make a more informed decision. The major impediment to risk management is currently the inability to share information among state and federal governments and the private sector. The government and private sector should work together to form partnerships and to improve the flow of information. To make risk management processes truly effective, people need to be educated on their advantages and disadvantages so that they can use such tools appropriately to help them prioritize and allocate resources. Paul Rosenzweig is Senior Legal Research Fellow in the Center for Legal and Judicial Studies at The Heritage Foundation. Alane Kochems is a National Security Policy Analyst in the Kathryn and Shelby Cullom Davis Institute for International Studies at The Heritage Foundation. page 5