Nigerian Pirates Kill 2 in Attack on Cargo Ship February 13, 2012
Posted by Chris Mark in Industry News, Piracy & Maritime Security, Risk & Risk Management.Tags: Anti Piracy, armed security, Chris Mark, hijackings, Lagos, Maritime Security, mark consulting group, Nigerian Pirates, Piracy & Maritime Security
add a comment
In the increasingly dangerous waters off of West Africa and in the Gulf of Guinea, Nigerian pirates attacked a cargo ship and killed the captain and chief engineer. This attacks comes on the heels of another attack off the coast of Benin last Thursday. The attack took place about 110 nautical miles off the coast of Lagos. Read the story here.
Black Swans, Probability Ignorance & FUD: Risk 101 February 13, 2012
Posted by Chris Mark in Risk & Risk Management.Tags: Chris Mark, InfoSec & Privacy, Maritime Security, mark consulting group, markconsultinggroup.com, Piracy & Maritime Security, risk management, security, security theater
add a comment
I have written several posts on risk and risk within the maritime security industry. You can read them here (#1, #2) There is a common mistake people sometimes make when venturing into risk management. It is the focus on the impact of an event while ignoring the probability or overestimating the probability of the event. Very serious events with very low probabilities of occurrence (or those which you are unable to calculate) are what has been coined as Black Swan events by Nassim Taleb in his book of the same name. When calculating or estimating risk it is sometimes a temptation to look at those incidents with high impact potential and low probabilities while ignoring the less severe events with her probability. This would be akin to venturing into the Amazon Rain Forest and protecting yourself from Grizzly bears (very large impact but low, low probability) only to die of blood loss from being bitten by a million mosquitoes because you did not take a mosquito net or bug spray as you were not concerned with “a little mosquito bite”.
It is important to calculate risk by using a method that accounts for both impact and probability. This will give you a method by which to calculate the actual risk of an event and take appropriate steps to manage the risk. As can be seen by the graphic at the top of the post, a high impact low probability event poses the same risk as a low impact, high probability event assuming the ratios are equal. While the impact can be calculated as someone finite (for example, the worst that can happen to a person is likely to be killed) the probability of an event which can cause the event can range from unlikely to infinitesimally small. As an example of probability ignorance I will use an example from my own life. A woman I know carries a hammer in her car given to her by her mother. The purpose of the hammer is to break the car window and escape in the event the car plunges into a lake or other body of water and begins to sink. While the idea of drowning in a sinking car is certainly frightening, the likelihood of a car plunging into a body of water at 7,000 feet in high desert is very, very, very low. In this scenario it would be suggested that a better use of the money spent on the hammer was a 20 minute discussion on the value of always buckling the seatbelt and never speeding.
So why is this important? Simple. Security practitioners sell on a concept known as FUD or Fear, Uncertainty, and Doubt. A great example of FUD is a commercial I saw recently. A security company announced that 4 houses are burglarized every 14 seconds in the US. The commercial then goes on to show a mother and her children and how scary a burglary can be. Lets do some quick math to see how ‘scary’ this really is. According to the US Census Bureau there are about 131 million housing units in the US. If there is a house burglarized every 14.6 seconds this means that there are 4.1 burglarized per minute, 246 per hour, 5,917 per day and 216,000 per year. WOW! That is alot! BUT…this means that if you live in a home you have a .16% change of having your home burglarized in a given year. This does not seem so bad now. Keep in mind that some areas such as urban areas have higher crime rates than other areas and some houses are burglarized more than once. Another area where the security vendor attempts to convince you to use their services is by intimating that burglaries result in physical assault. In the commercials, a woman (not a man) is with her children talking about how the neighbor was burglarized and “while the children weren’t home, imagine if they had been.” Very few burglaries result in any physical harm to anyone but the imagery in the commercial is significant.
When listening to the inevitable sales pitch from a security vendor, keep in mind that they have an objective to sell you services. The easy way to do this is to use the FUD technique. If I am selling meteorite insurance, I will tell you about the dangers of meteorites, irrespective of who small they may be. Remember, it is easy to lie with numbers and easier to lie with statistics. Always base security implementation on a risk analysis.
Black Swan events – The Amazon rain forest example gives us a good opportunity to talk about Black Swan events. While we can calculate the probability of being attacked by a Grizzly bear in the Amazon (practically zero since they do not live anywhere but North America) there could be a situation in which a Grizzly bear was present and did attack someone. Maybe a person illegally imported a bear and let it go in the Amazon. This type of event would be a ‘Black Swan’ as you really could not calculate the probability of that specific event. The book is a very good starting point for this concept.
-Graphic from MindTools.com
GlobalRiskInfo.com now on Twitter! February 11, 2012
Posted by Chris Mark in Risk & Risk Management.Tags: Chris Mark, globalriskinfo.com, InfoSec, Maritime Security, mark consulting group, markconsultinggroup.com
add a comment
“Slicing the Pie”; Risk Management 101 February 11, 2012
Posted by Chris Mark in Risk & Risk Management.Tags: black swan events, Chris Mark, combating piracy week, cybersecurity, data security, mark consulting group, markconsultinggroup.com, Risk & Risk Management, risk management, security
add a comment
This is a followup to “Risk 101: an Introduction to Risk” Security, and Risk are interesting topics that lend themselves to endless debate (and the occasional argument). They are concepts that are bandied about quite frequently but, in my experience, are often not well understood by those using the terms. I have been asked by clients to describe risk management and security in business terms. At the risk of over simplifying the concepts, I will explain the concepts in this post. Security can be described rather simply as the implementation of controls to counter address a vulnerability or address a threat. Consider your house as an example. If you install a lock on the front door, you are implementing a control (the lock) to address a vulnerability (an unlocked door) and a threat (that an unauthorized person will enter).
Risk can be described as the function of the likelihood of an event occurring and the impact should it occur. Risk can be quantified using a simple formula (R=P% x I$) or expressed qualitatively. In the scenario used above, there is a risk that your house will be burglarized. Depending upon where you live, and other factors, the likelihood (expressed in terms of probability) will vary from unlikely to more likely to very likely. The impact of the burglary will be determined by, among other things, the value of the assets that can be stolen. So how does this relate to security? The concepts are (or should be) inextricably entwined.
Controls should be implemented commensurate with the identified risk.
This is a very important concept. Consider the following scenario. If I were to offer you $1,000 to either 1) install a burglar alarm in your house or 2) install a fence to keep lions out of your yard, which option would you choose? Likely most readers would respond with the statement; “it depends upon where I live”. This demonstrates the example of security and risk management. There are two risks we are considering in this scenario. First, is the risk of burglary and second is the risk of lion attacks. If you live in the Kenyan bush, you may be more concerned about Lions as the probability is likely higher of a lion entering the yard then of a burglar. If you live in New York City you are likely more concerned about burglaries than lions as lions are not found in NYC (at least not legally). The controls you are considering are either a lock (to address the issues described previously) or a fence to address the threat of a lion entering the yard. Additionally, when we talk about ‘commensurate with the risk’ it means that the controls should be enough to address the risk but not too great. You would not put a $1,000 alarm system on a $500 car. It simply does not make sense and is an inefficient use of your limited resources.
With those topics covered very briefly, how do we discuss risk management from business terms? Easy. Consider that the risks to which you or your business are exposed are infinite. You may not believe there is a risk of being hit by a meteorite but I can assure you that as infinitesimally small as the chance may be, there is a chance (probability) and the impact is likely not very good (injury or death). If you question the example, read about the Sylacaugqa Meteorite here.
Now consider that the resources at your disposal (man hours, money, expertise, technology, information) is finite. You may have a huge budget, and world class expertise but the fact remains that you have finite resources to address infinite risks. The goal of risk management is to slice the pie of resources in a manner that allows you to address the greatest risks in the most efficient and effective manner possible. There are four primary methods of risk mitigation; Avoidance, Reduction, Sharing, and Retention or Acceptance. Using the burglary example.
Avoidance– You can ensure you don’t own anything that could be stolen. Or you could live in an isolated area where nobody else lives.
Reduction– You can reduce the risk (by reducing probability or impact) by installing locks or using a safe to protect your assets.
Sharing– You can get insurance for your assets to reimburse you if they are stolen.
Acceptance– you can simply accept the fact that burglary is a possibility but one you are willing to accept if the likelihood is remote or you have no assets to steal.
The idea is to allocate the pieces of pie (which represents your finite resources) in a manner to address as much of the risk as possible. It should be noted that there will always be residual risk and the possibility of Black Swan events.
Armed Security; Increasing Competition & Decreasing Demand February 10, 2012
Posted by Chris Mark in Industry News, Piracy & Maritime Security, Risk & Risk Management.Tags: Anti Piracy, armed security, Chris Mark, economics, ICoC, Maritime Security, mark consulting group, somali pirates
1 comment so far
Recently I wrote about the armed security market and the inevitable shakeout. A look at the most recently data supports this position and does not seem to fare well for the new entrants into the maritime security space. As of February 1st, 2012 there are now 307 signatories of the ICOC with 55 signing on December 1st, 2011 and another 42 signing on February 1st, 2012. While some of those signing are older, more established companies there is a large percentage of new entrants. In short, competition is becoming fierce within the maritime security industry.
In January, 2012 the IMB released statistics on pirate attacks and hijackings. From 2010-2011 pirate attacks in and around Somalia increased roughly 7.5% from 219 to 237 while at the same time hijackings decreased roughly 43% from 49 to 28. In 2010 approximately 22% of the ships attacked were taken and hijacked while in 2011 the percentage dropped to just below 12%. A combination of increased naval patrols, armed guards, and implementation of BMP is having a desired effect on hijackings.
There are several things that can be surmised from the information above. First, competition within the maritime security industry is increasing rapidly. With the wars winding down in Iraq and Afghanistan there is an increasing number of veterans entering the job market. Some of these are founding security and maritime security companies to try take advantage of the perceived demand for the services. This will have the effect of decreasing rates across the industry unless demand increases, as well. The second thing that can be surmised is that demand for maritime security is likely to decrease significantly. There are several reasons to anticipate a decrease. As current efforts are showing success companies will logically begin to evaluate the need for expensive, armed guards when other controls may prove sufficient. Additionally, it is expected that the number of ‘free riders’ will increase as companies begin to hedge their bets and forgo the use of security with the belief that other companies investment will have a residual affect on their security. Finally, insurance rates should drop for ships traversing high-risk waters making the justification for the cost of engaging armed security more difficult. As any first year economics student can attest; increasing competition and decreasing demand does not bode well for the industry. Companies will have to drop their prices to compete for a rapidly decreasing pool of potential clients. The end result is the inevitable shakeout of the industry.