Integrating Vulnerability and Threat Analysis: A New Benchmark for Port Security Ted Langhoff, Practice Director, and Port Security Practice Nishant Pillai, Director, Cargo and Port Security Practice

Point of View

The rise in globalization has dramatically increased the The Integrated Risk Model: What’s in a Name? flow of people, materials and capital across international To close the loop in enhancing security, ports should apply borders – generating new economic opportunities while both methodologies into a threat scenario and vulnerability making national borders around the world increasingly assessment to understand their security postures and vulnerable to a wide range of security threats. To achieve prioritize their security investments. The Integrated Risk the elevated level of security preparedness required in the Model combines these two approaches into a single post-9/11 world, ports require new models and approaches methodology and is applied at both the individual terminal that enable them to gain greater insight into risk and make facility and port-wide levels. This model also considers informed decisions about security and resource utilization operational factors such as cargo, people and information without impeding the flow of trade. process flows when determining risk and action plans, taking Traditionally, ports have leveraged either questionnaire-based into account potential adversaries as well as a port’s vulnerability assessments or scenario-based threat security forces when analyzing threats and vulnerabilities methodologies to measure their security postures. A threat and making decisions about how to apply security resources. scenario approach considers the full spectrum of threats, To understand how the integrated model applies its operational identifies their sources, and examines supporting focus, consider, for example, a port deemed susceptible to information to evaluate the likelihood and consequence of drug trafficking based on its geography. A specific terminal each threat. Conversely, vulnerability assessment utilizes within the port, however, may only receive a few vessels standard questionnaires to identify existing points of containing cargo containers each year or may only receive weakness and calculate the vulnerability level. Neither shipments originating in low risk countries. Based on these approach, however, when used in isolation presents a factors, customs officials and port officials may determine comprehensive picture of potential risk. As a result, neither the terminal to be of relatively low risk and focus its resources can provide a comprehensive view of risk nor facilitate the in other areas. Conversely, terminals that receive shipments optimization of security resources. in containers from high-risk countries or automobiles in car carrier Ports require an integrated risk-based security model that vessels (as opposed to bulk materials such as grain or coal) combines elements of vulnerability assessments and threat may be at a greater risk and merit additional cargo screening scenarios in a dynamic fashion – focusing on human, cargo resources because they are more conducive to smuggling and asset movement and vulnerability – and includes a contraband. By understanding a port’s composition and its paradigm for decision making that helps port operators to operational environment, customs and security officials can optimize both security and resource utilization. apply the right security measures to the highest risk operations. The integrated risk approach also considers the capabilities Just as a static, one-dimensional security assessment does and intentions of adversaries. Sri Lanka, for example, has not ensure the safety of a port, security measures and grappled with for the past 30 years. Because its technology applied in isolation will not yield the intended adversary, the Tamil Tigers, was sophisticated, well armed results. A port or terminal, for example, may deploy security and intended to disrupt the national economy, it targeted fences, guards, physical access control, biometrics, video Port Columbo for destruction and successfully carried out surveillance, and analytics. Alternatively, a port may have the several direct attacks against the port, berthed vessels and maximum number of security guards strategically placed infrastructure. As such, security infrastructure was deployed throughout the terminal and still receive an elevated to prevent and mitigate direct attack threats. In contrast, vulnerability score, as it may not conduct proper identification ports in Latin America known for illegal drug activity may be checks of individuals entering the port consistently or based less likely targets for direct attacks, as drug traffickers want on best practices. While these technologies and measures to ensure that cargo is moved quickly and their merchandise may create a highly secure physical environment, this approach remains undisturbed. By recognizing the capability and intent alone does not ensure the security of the overall operation of adversaries, ports can more effectively prioritize their security as it does not address the movement of cargo. Therefore, it efforts and resources to “buy-down” their risk. is essential when planning security improvements to focus beyond individual security measures and build integrated Beyond Compliance: Achieving a programs to avoid potential “stove-piped” measures which Comprehensive Port Security Plan create security seams that can be exploited by adversaries. After a port’s existing or “as-is” security posture is defined, Also, it is important to prioritize security measures to address it is important to identify and plan actionable steps to reduce the highest priority threats to avoid “closing the barn door after the port’s critical areas of vulnerability. The first step is to the animals have fled.” For example, in ports where smuggling focus on fully complying with existing international and national is the most critical threat, the aforementioned perimeter security standards such as the International Port Security Program measures will have less impact than adroitly applied cargo (ISPS), the international-based code, and the Maritime screening and targeting and non-intrusive inspection measures. Transportation Security Act (MTSA), the US-based standard. As the security landscape becomes increasingly complex, The ISPS and MTSA standards provide the critical security ports are looking for approaches to comprehensively framework, in terms of the physical infrastructure that port evaluate their risk and guide them in their planning and facilities should have in place (i.e. video surveillance, access deployment efforts. By applying the integrated risk model control, etc.) to comply with international and US requirements. and approach, ports can effectively bridge the gap between But although these standards offer an effective first step to existing compliance levels and comprehensive and effective security, they do not prescribe how to effectively ensure security. The integrated risk model/methodology links a security, disaster preparedness and recovery, and continuity port or terminal’s existing security posture with integrated of operations. As the US Department of security programs to enable them to rapidly evaluate the risk becomes increasingly focused on security threat resiliency, mitigation effect of both individual security measures and port officials must look beyond the compliance “checklist” overall programs. and adopt strategies and solutions that will help them to lower their risk and respond to and recover from acts of terrorism.

2 As ports maintain their position on the frontline of the battle to facilitate global trade and ensure homeland security, forward-looking organizations require new approaches that enable them to provide high levels of security without hindering the flow of commerce. Several guiding principles have emerged as best practices in this quest.

1. Comprehensive: Evaluate (and calculate) security posture to include threats, consequences and vulnerabilities 2. Operational risk assessment: Incorporate operations into the risk assessment to identify points of weakness in the flow of cargo, people and information 3. Prioritization: Identify and prioritize security measures that deliver the highest risk mitigation (security improvement) benefits particular to the port or terminal 4. Sustainability: Assess the operational deployment and impact of security measures to determine the feasibility of deployment and the optimal location and weigh the intended security objectives (improvements) against operational impact 5. Seamlessness: Organize security measures into integrated and layered security programs Ports that build their security foundation on these concepts will be well equipped to mitigate risks and ensure the safety of maritime cargo today and into the future.

3 For more information visit www.unisys.com

© 2013 Unisys Corporation. All rights reserved.

Unisys, the Unisys logo and ClearPath are registered trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.

Printed in the of America 04/13 13-0107