Nigerian Pirates Kill 2 in Attack on Cargo Ship February 13, 2012
Posted by Chris Mark in Industry News, Piracy & Maritime Security, Risk & Risk Management.Tags: Anti Piracy, armed security, Chris Mark, hijackings, Lagos, Maritime Security, mark consulting group, Nigerian Pirates, Piracy & Maritime Security
add a comment
In the increasingly dangerous waters off of West Africa and in the Gulf of Guinea, Nigerian pirates attacked a cargo ship and killed the captain and chief engineer. This attacks comes on the heels of another attack off the coast of Benin last Thursday. The attack took place about 110 nautical miles off the coast of Lagos. Read the story here.
Black Swans, Probability Ignorance & FUD: Risk 101 February 13, 2012
Posted by Chris Mark in Risk & Risk Management.Tags: Chris Mark, InfoSec & Privacy, Maritime Security, mark consulting group, markconsultinggroup.com, Piracy & Maritime Security, risk management, security, security theater
add a comment
I have written several posts on risk and risk within the maritime security industry. You can read them here (#1, #2) There is a common mistake people sometimes make when venturing into risk management. It is the focus on the impact of an event while ignoring the probability or overestimating the probability of the event. Very serious events with very low probabilities of occurrence (or those which you are unable to calculate) are what has been coined as Black Swan events by Nassim Taleb in his book of the same name. When calculating or estimating risk it is sometimes a temptation to look at those incidents with high impact potential and low probabilities while ignoring the less severe events with her probability. This would be akin to venturing into the Amazon Rain Forest and protecting yourself from Grizzly bears (very large impact but low, low probability) only to die of blood loss from being bitten by a million mosquitoes because you did not take a mosquito net or bug spray as you were not concerned with “a little mosquito bite”.
It is important to calculate risk by using a method that accounts for both impact and probability. This will give you a method by which to calculate the actual risk of an event and take appropriate steps to manage the risk. As can be seen by the graphic at the top of the post, a high impact low probability event poses the same risk as a low impact, high probability event assuming the ratios are equal. While the impact can be calculated as someone finite (for example, the worst that can happen to a person is likely to be killed) the probability of an event which can cause the event can range from unlikely to infinitesimally small. As an example of probability ignorance I will use an example from my own life. A woman I know carries a hammer in her car given to her by her mother. The purpose of the hammer is to break the car window and escape in the event the car plunges into a lake or other body of water and begins to sink. While the idea of drowning in a sinking car is certainly frightening, the likelihood of a car plunging into a body of water at 7,000 feet in high desert is very, very, very low. In this scenario it would be suggested that a better use of the money spent on the hammer was a 20 minute discussion on the value of always buckling the seatbelt and never speeding.
So why is this important? Simple. Security practitioners sell on a concept known as FUD or Fear, Uncertainty, and Doubt. A great example of FUD is a commercial I saw recently. A security company announced that 4 houses are burglarized every 14 seconds in the US. The commercial then goes on to show a mother and her children and how scary a burglary can be. Lets do some quick math to see how ‘scary’ this really is. According to the US Census Bureau there are about 131 million housing units in the US. If there is a house burglarized every 14.6 seconds this means that there are 4.1 burglarized per minute, 246 per hour, 5,917 per day and 216,000 per year. WOW! That is alot! BUT…this means that if you live in a home you have a .16% change of having your home burglarized in a given year. This does not seem so bad now. Keep in mind that some areas such as urban areas have higher crime rates than other areas and some houses are burglarized more than once. Another area where the security vendor attempts to convince you to use their services is by intimating that burglaries result in physical assault. In the commercials, a woman (not a man) is with her children talking about how the neighbor was burglarized and “while the children weren’t home, imagine if they had been.” Very few burglaries result in any physical harm to anyone but the imagery in the commercial is significant.
When listening to the inevitable sales pitch from a security vendor, keep in mind that they have an objective to sell you services. The easy way to do this is to use the FUD technique. If I am selling meteorite insurance, I will tell you about the dangers of meteorites, irrespective of who small they may be. Remember, it is easy to lie with numbers and easier to lie with statistics. Always base security implementation on a risk analysis.
Black Swan events – The Amazon rain forest example gives us a good opportunity to talk about Black Swan events. While we can calculate the probability of being attacked by a Grizzly bear in the Amazon (practically zero since they do not live anywhere but North America) there could be a situation in which a Grizzly bear was present and did attack someone. Maybe a person illegally imported a bear and let it go in the Amazon. This type of event would be a ‘Black Swan’ as you really could not calculate the probability of that specific event. The book is a very good starting point for this concept.
-Graphic from MindTools.com
Chris Mark Speaking at Combating Piracy Week in Hamburg February 2, 2012
Posted by Chris Mark in Industry News, InfoSec & Privacy, Piracy & Maritime Security, Risk & Risk Management.Tags: Chris Mark, combating piracy week, cyberpiracy, hanson wade, InfoSec, Maritime Security, Piracy & Maritime Security, risk management, security
add a comment
I will be speaking at the Combating Piracy Week in Hamburg, Germany on the topic of CyberSecurity & CyberEspionage The topic will discuss the topics with a focus on who is trying to steal your data and why. It will also cover the technologies and tactics of how they can steal your corporate data and what the uses of such data. You can get a preview of the topic by reading the Maritime Executive article in which I was interviewed.
If you have not attended one of the Hanson Wade Piracy events, it is worth attending. Hanson Wade’ personnel do a great job of coordinating networking and the speakers are all very professional and very adept. I have had opportunity to speak at nearly 100 events in the past 12 years or so and I would put the Hanson Wade events in the top 5 in terms of value for the money. I highly recommend this event for security companies that want to meet decision makers and speak with the people who influence the industry from a security perspective.
A Rant about Risk- Rock Climbing with a 2 year old January 31, 2012
Posted by Chris Mark in Risk & Risk Management.Tags: Chris Mark, InfoSec, mark consulting group, Piracy & Maritime Security, privacy, risk management
add a comment
Today on NBC Sports there was an article about woman rock climbing with her 2 year old strapped to her back. The toddler is not wearing a helmet. When asked she explained: “I can appreciate if you didn’t realize how safe the environment I was in, it could be worrying, but I was top-roping which means if you fall you don’t fall any further than where you came off.” She further opined: “It is the safest form of climbing you can do…Health and safety legislation and the sue and blame culture mean so many people are nervous, so afraid of getting into trouble, and taking small risks. Life is all about risks, whether that’s something as simple as getting in your car every day or climbing up a rock face.” This reminded me of a debate I had several years ago.
I was talking with a company about protecting personally identifiable information (PII) as required by law. The company’s response was: “It is too expensive to comply. I will take the risk.” The problem lies in that the data that they are required to protect is not their information. While the data itself (bits and bytes) may belong to the company the information represented by the bits and bytes is the property of the person to which it refers. In short, it is not the company’s risk to assume as it is not their property. If I want to publish my own personal data on the Internet, I can do so and assume the risk…it is my data. A third party cannot assume risk for me…without my permission. This is why companies are required to protect PII, NPI, PHI, and other forms of personal data.
In much the same way this woman can free climb naked (alone) if she chooses. It is her risk to assume. Whether her style of climbing is the safest does not mean it is without risk. It is a less risky than free climbing but any form of rock climbing is an inherently risky activity. The 2 year old does not have the ability to state whether she wanted to climb or not. Where I have issue with the woman is her attitude of: “life is all about risks…” Granted but some peoples’ lives are about taking more risks than others. As adults we can make the decision to base jump, free climb, skydive, or race motorcycles. When we include others in our risky behavior without their consent, it becomes problematic.
Rant Alert- Security Neophytes January 30, 2012
Posted by Chris Mark in InfoSec & Privacy, Risk & Risk Management.Tags: Chris Mark, cybersecurity, information assurance, Maritime Security, Piracy & Maritime Security, security
add a comment
Like others who read this blog, I have worked in several areas of security over the years including physical security and information assurance. Irrespective of the domain of security in which you work, the underlying principles are similar. Risk management, defense in depth, and incident response are common principles in all areas of security though the implementation may differ. Security is a discipline that, like any discipline, requires study and experience to become proficient. Physical security is about more than holding a gun and information assurance is about more than having a firewall.
I recently came across a the website of a company that states in uncertain terms that that they are experts in cybersecurity (and several other domains). To demonstrate their “industry leading” expertise they state that they can manage ‘various firewalls’ and that they have experience with ‘intrusion detection systems’. Really? This is expertise? While we shake our heads at their approach, some company will hire them because they can offer services at lower rates (due to the lack actual expertise) and there will be the inevitable incident. It is this amateur approach to security that results in companies being hacked in the information assurance business and people being arrested or killed in the maritime security arena.
For what ever reason every tom, dick or harry (or sally) that has ever carried a rifle or worked for the government believes that he or she is now a “security professional”. Unfortunately, these companies make their way into the various industries and create issues for those professional organizations that have actual expertise borne of hard earned experience and have paid their dues to understand the issues and understand their discipline.
