Kidnappings and Ransoms | Scope of Risk
Espionage or Information Security Breach | Scope of Risk
Commercial or industrial espionage includes the acquisition of sensitive commercial or government information through both legal and illegal means in order to steal, use, or acquire data that will give illegally gained competitive advantages in technological or brand capacity, or undermine another group's business activities or reputation. Espionage can be an unethical but legal act if information is gathered from discarded materials that come into the public domain. This may include riffling through the trash in order to find sensitive documents. Industrial espionage may also use both unethical and illegal means to gain information by theft of trade secrets, the use of bribery and blackmail, seduction and pretense, human and technological surveillance, and violence and intimidation. Industrial espionage may be undertaken by criminal groups, businesses, or governments, or in some cases by insurgent and terrorist organizations, and often occurs during a tendering or product development period.
Incident Management Plan Risk Assessments
Immediate Concerns
- Is there an immediate risk to personnel?
- Is there an immediate risk to the company's reputation?
- What risks are presented to resources or facilities?
- Is there a risk to third parties?
- How long before any of these risks occur—how much time is there?
Situation
- What is the cause or motive of the risk event?
- Is it likely to get worse?
- Are other (different) threats likely to occur?
- What happened, where, and when?
- What effects are to be expected in the best case, likely case, and worst case?
Complicating Factors
- What legal implications are there?
- What media interest has been shown?
- What environmental factors will hamper the resolution of the problem?
The IMP risk assessment should not be confused with the responsibilities of the crisis response team and specialist responders, who should conduct more comprehensive risk assessments and evaluations during and following the crisis. The IMP risk assessment is a tool designed to provide a local perspective of the problems and impacts likely to occur that might fall outside of normal reporting formats within the IMP. While not a component of the IMP, the company should also link risk assessments to any recovery plans so that when the situation has sufficiently stabilized the company can begin to plan the resumption of normal operations.
REDUCING VULNERABILITY THROUGH MITIGATION ACTIVITIES
Mitigation activities or controls are any actions taken to permanently eliminate or reduce the risk of hazards to human life, property, and function. The four basic mitigation activities are as follows:
-
Deterrent controls reduce the likelihood of a deliberate attack and/or dissuade would-be attackers by making a facility less desirable as a target.
-
Preventive controls protect vulnerabilities by making an attack unsuccessful or reducing its impact.
-
Corrective controls reduce the effect of an attack.
-
Detective controls discover attacks and may trigger preventive or corrective controls.
Combining Risk Assessments and Mitigation Initiatives
A more sophisticated method of conducting risk analysis and assessing mitigation initiatives is a failure modes and effects analysis (FMEA) (Electronic Industries Association 1971). Developed by the U.S. military in 1949 as a reliable evaluation technique to determine the effect of system and equipment failures (U.S. Armed Services 1984), FMEA systematically identifies potential system failures, their causes, and the effects on the system’s operation. It is most often used to proactively assess the safety of system components and to identify design modifications and corrective actions needed to mitigate the effects of a failure on the system.
The FMEA process can be a valuable tool in improving internal preparedness for response to emergencies or disasters of any sort and has been endorsed by the Joint Commission on Accreditation of Healthcare Organizations (JCAHO). When the analysis is extended to include an assessment of the failure mode’s severity and probability of occurrence, the analysis is called a failure mode, effects, and criticality analysis (FMECA).
An example of the FMECA process applied to routine hospital operations might be patient admissions through the emergency department. To admit a patient, a number of functions must occur: an accepting physician must be identified and contacted, initial orders must be provided to the accepting floor or ward, administrative and clerical work accompanying the admission must be completed, a bed and the nursing staff must be prepared to accept the patient, and the patient must be delivered to the floor or ward. A defined failure might be the inability to admit the patient within one hour of the determination that admission is warranted. By analyzing the processes involved with getting the patient admitted, failure modes can be identified (e.g., inordinate delay in preparing the patient’s room), and the root cause of these failure modes can be further elucidated. If the cost of the failure mode is sufficient (e.g., patient or staff dissatisfaction), procedures may be modified, additional staff may be hired, or other actions may be taken to improve this process.
RISK MANAGEMENT AND Weapons of Mass Effect
The actual risks from the use of such horrific weapons by terrorists against the American population are difficult to determine. Most communities face a much greater threat from unintentional anthrogenic or natural disasters. Traditional events—those due to accident, nature, or human error—can be predicted or at least anticipated based on historical records, and the magnitude of the consequences can be estimated. For instance, the existence and location of floodplains are known, as are areas prone to tornadoes or hurricanes, and local emergency planning committees are aware of the locations and quantities of highly toxic materials. Armed with such information, engineering and administrative controls instituted as an outcome of previous disasters have greatly lessened the consequences of these events.
The key elements of effective risk management are threat and vulnerability assessments. These processes, discussed in greater detail in Chapter 3, form the backbone for risk assessment. Risk assessment drives mitigation initiatives to prioritize actions to reduce either the probability that an event will occur or lessen the consequences should it happen. Modeling and simulation are powerful tools to identify community or facility vulnerabilities to a wide range of potential threats but do little to determine the actual threat.
The WME threat is based on terrorist motive, opportunity, and availability of the weapons or agents. Little need be said concerning terrorist motivation to do harm against the United States and its citizens. Although the United States is the most open society in the world, difficulties in gaining entrance to the nation while harboring significant caches of these weapons lessen, but do not eliminate, the opportunity. It is only the lack of the availability of such weapons, or the skills and resources by which to produce them, that keeps the overall threat low. Advances in science may work against these odds in the future, however. It is generally presumed that terrorists will have the greatest difficulty in obtaining or fielding those weapons that produce the greatest threat: nuclear or biological weapons. Chemical-warfare attacks and the use of radiological dispersal devices are considered to pose an intermediate threat, and the use of conventional explosives or the intentional release of toxic industrial materials poses the greatest threat.
It is equally difficult to measure the threat against a specific community or organization. Most terrorist attacks historically were targeted against governments, the military, or industry. Although these organizations and entities remain high on terrorist lists, a trend has developed over the last decade toward attacks against the civilian population. This shift is in keeping with the prime motivation of terrorists to create terror. Although the random sniper attacks near Washington, DC, in fall 2002 did not use WME, the effect was the same: a population significantly affected by fear. Finally, extremist organizations within our borders, such as religious cults or single-issue terrorists, may target organizations traditionally not prone to such attacks. One can only imagine the overall effect on its citizens if hospitals in small towns across the United States were targeted for explosions in a random fashion over several weeks or months.