Level of residual risk - missions

Security management
SpeC for Log
Marine Menier
13 juillet 2017
September 2012
KLV3 – Security Chapter
13 juillet 2017
2
KLV3 – Security Chapter
13 juillet 2017
3
The framework of a systematic approach
Where are
we
Who are we
Visibility
Protection
Deterrence
Security system
Authorities
Acceptance
Inter-agency dimension
People
factors
Agency management
Intra-agency
factors
Security approaches
Security procedures
13 juillet 2017
4
Information management
SpeC for Log
13 juillet 2017
Information & Rumor
 What is an information ?
 “Knowledge of specific events or situations that has been
gathered or received by communication; intelligence or news”
 What is a rumour ?
 “A piece of unverified information of uncertain origin”
 What is the difference(s) between an information and a
rumour?
• Authenticated source(s)
• Verification / Crosscheck
 An origin
 A knowledge
 Can an information become a rumor?
 Can a rumor become an information?
13 juillet 2017
6
Information management system
 What is an information management system ?
It organizes the
• Collection
• Transmission
• Compilation
Of security informations, to observe the contexte, build
cartography, et adapt our strategies and procedures
 Roles and responsabilities
• Everybody knows those informations.
• The security officer collect and compil the
informations.
13 juillet 2017
7
Passive Information collection
 How de we collect security information ?
• Gather information
• Receive information
 Active information collection
 Passive information collection
Who receive security information ? Everybody, even you!
From who? Everybody!
When? At any time!
How? Daily, during or outside working hours, when you will
be with people who will give you spontaneously security
information.
 You roll is to collect enough information to crosscheck and
control them!




13 juillet 2017
8
Active information collection
 Identify and contact the actors
 Who can give you some informations?
• Local authorities: the Mayor, the Police, the army
• NGOs/IOs/UN,
• Embassies,
• Local population (including beneficiaries & suppliers),
• Community heads : elders, religious leaders, Staffs…
13 juillet 2017
9
When you collect information, don’t
forget to…
 Have multiple sources to cross check the informations
• Be careful not to crosscheck with people who have the same
source as you!
 Develop your confidentiality sense
• Sharing of information is not always an absolute transparent
process.
• Adapting informations and level of details depending on the
interlocutor.
13 juillet 2017
10
Information transmission
Point focal de
sécurité
Chefs
d'équipes
Acteurs
externes
Employés d'ACF
The time and the way of transmission will depend on the importance
and possible impact of the information.
13 juillet 2017
11
Security risk analysis
SpeC for Log
13 juillet 2017
Part 1. Security risk
assessment
RISK ANALYSIS TABLE (RAT) <BASE>
Last Update:
Ranki
ng
Threats (1)
Vulnerabilitie
s (2)
Contextual
factors
Risk
(3)
Likelihood
from 1 to 5
Impact
from 1 to 5
Reduction of
Threats
(Acceptance
Strategy)
Reduction of
Vulnerabilities
(Protection
Strategy)
Residual
Risk
0
0
CONFIDENTIEL
13 juillet 2017
13
1 – Threats assessment
A threat is a danger to you, your organisation or your assets
 A threat can be:
2 phases of a threat assessment:
• Direct
 Retroactive threat assessment: to
look at what has already happened
• Indirect
 Proactive threat assessment: seeing
the danger in advance
• Crime related
13 juillet 2017
14
2 – Vulnerabilities analysis
Vulnerability is the degree of exposure to a specific threat
 Why you /your organisation would be vulnerable to the threat?
 When you /your organisation would be vulnerable to the threat?
 Who would be vulnerable to the threat?
13 juillet 2017
15
3 – Formulate the risk
The risk is the likelihood of being faced with a threat and its impact
Depending of the nature of a threat, the
risk will be expressed differently:
 If the threat is direct, the risk for ACF
will be for our staff or organisation to
be the target of a specific threat
 If the threat is an indirect threat, the
risk for ACF will be related to
“collateral damages”
 If the threat is related to a crime, the
risk for ACF will be for our staff or
organisation to be victim of <a crime>
(you need to be specific about the
type of crime)
13 juillet 2017
• Example: a direct threat of
suicide attack against ACF, the
risk would be for ACF to be the
target of a suicide attack.
• Example: a threat of suicide
attack that target only
government or military forces,
the risk will be to be subjected
to a suicide attack and thus to
suffer collateral damages
• Example: to be victim of a
robbery.
16
Case study Leilaland – Part 1
 In working groups, identify the possible threats & associated risks
existing on the 3 bases in Leilaland.
13 juillet 2017
17
Restitution – Leilacity
LEILACITY
Threat
Vulnerability
Intrusion +
Theft
 Protection (Watchmen,
fence, lighting,
neighbourhood …)
 Urban criminality
 To be the victim of an
intrusion and/or robbery
Riots +
Looting
(direct or
indirect)
 Information
 Premises’ localisation
 Visibility…
 Violent food related
demonstrations against
authorities
 Repression
To be subjected or to be
the target of a riot
To be subjected or to be
the target of an intrusion
and/or looting
Terrorism
(direct or
indirect)
 Movement
 Premises’ localisation
 Visibility…
 Against governmental
buildings
 To be subjected or to be
the target of a terrorism
attack
 Movements
 Visibility…
 Corruption
 Pressure on the Police
forces to find terrorist
 To have a staff victim of
an arrest
 Communication
 Visibility…
 Corruption in the Police  To have a staff/team
& army
victim of threat or
harassment
 Checkpoints
 Control for “infractions”
Arrest
Abuse of
power
13 juillet 2017
Contextual factors
Risk
18
Restitution – Leilabeach
LEILABEACH
Threat
Vulnerability
Contextual factors
Risk
 Criminals /Armed
gangs /Firearms
 Robbery at night in
the neighbourhood
 To be the victim of an
intrusion and/or robbery
 Movements
Armed
aggression  Personal behaviour…
 Criminals /Armed
gangs / Firearms
 To have a staff/team victim
of an aggression
Riots +
 Information
Looting
 Premises’ localisation
(direct or
indirect)  Visibility…
 Call for
demonstration
against the
government
 Firearms
 Violence expected
To be subjected or to be the
target of a riot
To be subjected or to be the
target of an intrusion and/or
looting
 All type of vehicle
 Road to the airport
 3rd district
 To have a staff/team victim
of a car-jacking
Intrusion
+ Theft
Carjacking
 Protection
(Watchmen, fence,
lighting,
neighbourhood …)
 Movement,
 Type of vehicle
 Visibility
13 juillet 2017
19
Restitution - Leilamount
LEILAMOUNT
Threat
Vulnerability
Armed
aggression
 Movements
 Personal behaviour…
Contextual factors
Risk
 AOG/ ACG
 To have a staff/team victim
of an aggression
 Mines
 To be subjected or to be
target of a mine explosion
 Movement,
Car-jacking  Type of vehicle
 Visibility
 Target: 4x4
 At nightfall
 Outskirt of the city
 To have a staff/team victim
of a car-jacking
Kidnapping
 Kidnapping of
foreigners
 Political demands
 Soft border
 AOG / ACG
 To have a staff/team victim
of a kidnapping
Mine
(direct or
indirect)
 Movement
 Information …
 Set up
 Movement
 Information …
13 juillet 2017
20
Part 2. Notation
RISK ANALYSIS TABLE (RAT) <BASE>
Last Update:
Ranki
ng
Threats (1)
Vulnerabilitie
s (2)
Contextual
factors
Risk
(3)
Likelihood
from 1 to 5
Impact
from 1 to 5
Reduction of
Threats
(Acceptance
Strategy)
Reduction of
Vulnerabilities
(Protection
Strategy)
Residual
Risk
0
0
CONFIDENTIEL
13 juillet 2017
21
1 – Likelihood
The likelihood is the probability of a particular event to occur
Descriptor
“Likelihood” definitions
Mark
Very unlikely
In the present situation and with the mitigation measures
actually in place, the probability of the event occurring is
considered as remote
1
Unlikely
In the present situation and with the mitigation measures
actually in place, the event is considered as not having a
realistic probability of occurring
2
Possible
In the present situation and with the mitigation measures
actually in place, the event is considered as having a
reasonable probability of occurring
3
Likely
In the present situation and with the mitigation measures
actually in place, the event is considered as having a high
probability of occurring
4
Almost
certain
In the present situation and with the mitigation measures
actually in place, the occurrence of the event is to be
expected at short-term
5
13 juillet 2017
22
2 – Impact
The impact is the severity of the casualties/ damages that ACF would
suffer if a particular event occurs
Human impact
Operational impact
Descriptors
Descriptors
No injuries
Minor
injuries
possible stress
No
/
life-threatening
injuries
/
high
stress
Severe
injuries
kidnapping
Death or kidnapping
Impact =
13 juillet 2017
Assets impact
or
Descriptors
1
Minor disruptions
1
Immaterial / no damages
1
2
Delays
2
Possible/minimal
damages
or
(under 5 000€)
2
3
Suspension
activities
4
5
of
loss
3
Significant
50 000€)
loss
(<
3
Closure of programs
4
Major loss (< 100 000€)
4
Withdrawal
5
Critical loss (> 100 000€)
5
(Human impact x 3) + (Operational impact x 2) + (Assets impact x 1)
6
23
3 – Level of risk & ranking
Level of risk = Impact x Likelihood
Rank is based on the level of risk: the greater level of risk is ranked 1,
the second, 2 and so on in decreasing order.
13 juillet 2017
24
Part 3. Mitigation measures
RISK ANALYSIS TABLE (RAT) <BASE>
Last Update:
Ranki
ng
Threats (1)
Vulnerabilitie
s (2)
Contextual
factors
Risk
(3)
Likelihood
from 1 to 5
Impact
from 1 to 5
Reduction of
Threats
(Acceptance
Strategy)
Reduction of
Vulnerabilities
(Protection
Strategy)
Residual
Risk
0
0
CONFIDENTIEL
13 juillet 2017
25
1 - Mitigation measures
Mitigation measures is what can be done to reduce the risk
1. Reduction
of
the
threat
 Acceptance strategy
2. Reduction of the vulnerability
 Reducing the likelihood
 Reducing the impact
 Rules and procedure
Equipment and means
Facilities
Human Resources
13 juillet 2017
26
Case study Leilaland – Part 2
 In working groups, propose solution, security rules to mitigate one of
the risks your group identified in the first part (10’)
LEILALAND
Risk
Reduction of
threats
Reduction of
vulnerabilities
 Restitution per group (3 x 5’)
13 juillet 2017
27
2 – Action Plan
Category
Action
Rules and
procedures
Action 1
Tasks to be
undertaken
Task 1
Contributors
HoB + LC
ETS
(estimated
date of
start)
XX/ XX / 201X
ETC
(estimated
date of
completion)
Comments
XX/ XX / 201X
Task 2
Task 3
Action 2
…
Equipment /
means
Action 1
Action 2
….
Facilities
Action 1
Action 2
….
HR
Action 1
Action 2
….
13 juillet 2017
28
Part 4. Risk threshold
RISK ANALYSIS TABLE (RAT) <BASE>
Last Update:
Ranki
ng
Threats (1)
Vulnerabilitie
s (2)
Contextual
factors
Risk
(3)
Likelihood
from 1 to 5
Impact
from 1 to 5
Reduction of
Threats
(Acceptance
Strategy)
Reduction of
Vulnerabilities
(Protection
Strategy)
Residual
Risk
0
0
CONFIDENTIEL
13 juillet 2017
29
1 – Risk Threshold
The threshold of acceptable risk for the organisation is
the point beyond which the risk is considered too high
to continue operating; influenced by the probability
that an incident will occur, and the seriousness of the
impact if it occurs
13 juillet 2017
30
2 - Level of residual risk
Level of residual risk = Residual likelihood x Residual impact
RESIDUAL LIKELIHOOD
1
- Very
2 - Unlikely
unlikely
3 - Possible
4 - Likely
5 - Almost
certain
RESIDUAL IMPACT
5 - Critical
5 - Low
10 - Medium
15 - High
20 - Critical
25 - Critical
4 - Severe
4 - Low
8 - Medium
12 - High
16 - High
20 - Critical
3 - Moderate
3 - Very Low 6 - Low
9 - Medium
12 - High
15 - High
2 - Minor
2 - Very Low 4 - Low
6 - Low
8 - Medium
10 - Medium
1 - Negligible
13 juillet 2017
Nil
2 - Very Low 3 - Very Low 4 - Low
5 - Low
31
3 - Fixing the threshold of acceptable risk
Depending of the level of residual risk, ACF has defined a clear line of
decision making:
 The Very Low and Low level of risks are considered inherent to our
mandate and therefore acceptable.
 The Medium level of risks is also inherent to our mandate but its
acceptance has to be discussed in between the HoM, the Desk and the
Head of the Security Service. The decision will be endorsed by the
Desk Officer.
 Risk acceptance for the High level risks has to be discussed in between
HoM with the Desk, the Security Adviser & the Head of Operations.
The conclusion will be endorsed by the Head of Operations.
 The Critical risks are unacceptable (where ACF has knowledge of a
credible threat that could harm its staff if it materializes with a very
high probability to materialize)
13 juillet 2017
32
Questions?
13 juillet 2017
33