Threat Assessment Techniques Using ASIS Standards: Lessons from the September 2012 Attack on the American School in Tunis

ACSTSECURITY 53 views 14 slides Jun 27, 2024
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

This presentation is part of a comprehensive course delivered to a security association, comprising one of five in-depth modules designed to enhance the threat assessment capabilities of security professionals.

Through a detailed examination of the September 2012 attack on the American Cooperative...


Slide Content

Threat Assessment Techniques Dynamics and Lessons Learned from the September 2012 Attack on ACST

Module 3: Topics Covered: Case Study: Applying Threat Assessment in Action: Tunis Incident Risk assessment methodologies (ASIS standard) Vulnerability assessments (Risk Identification) Scenario analysis (Risk Analysis) Conducting threat modeling exercises (Risk Evaluation) Assessing threat likelihood and impact (Risk Treatment) Prioritizing threats based on risk levels ( Monitoring and Review)

Applying Threat Assessment in Action: September 14, 2012

Tunis School Attack – September 14th Timeline: September 11, 2012: Attack on U.S. consulate in Benghazi sparks global protests. September 14, 2012 (Morning): Protests escalate outside U.S. Embassy in Tunis. Early Afternoon: Protesters breach the embassy compound. Afternoon: Protesters move towards and breach ACST campus, causing extensive damage.

Lessons Learned & Key Takeaways Proactive Security is Vital: Prior threat assessment and collaboration with security partners enabled early action, preventing harm. Information Sharing is Key: Open-source intelligence and professional networks provided crucial situational awareness. Early Action Saves Lives: Decisive decision-making (early dismissal) mitigated the potential impact of the attack. Continuous Vigilance is Necessary: Even with preparation, unexpected events can occur. Threat assessment must be an ongoing process.

Risk Assessment Methodologies

ASIS Security Risk Assessment Standard Risk Identification Risk Analysis Risk Evaluation Risk Treatment Monitoring and Review

Risk Identification This involves systematically identifying and documenting assets, threats, and vulnerabilities relevant to the organization. A thorough understanding of the organization's operating environment, including internal and external factors is REQUIRED .

Risk Analysis Qualitative Methods Quantitative Methods Interviews/Focus Groups: Gather expert opinions and insights on risks. Probability Analysis: Calculate the probability of a risk occurring. SWOT Analysis: Assess strengths, weaknesses, opportunities, and threats. Impact Analysis: Quantify the impact of a risk on various factors. Scenario Planning: Explore potential scenarios and their impact on the organization. Statistical Modeling: Use data to model risk patterns and trends.

Risk Evaluation This involves assessing the significance of each identified risk based on its likelihood and impact. Risks are then prioritized to determine which ones require the most immediate attention and resources.

Risk Treatment This step outlines various strategies for managing risks, including risk avoidance, risk reduction (mitigation), risk transfer (insurance, outsourcing), and risk acceptance (when the cost of mitigation outweighs the potential impact).

Monitoring and Review Regularly updating the risk assessment based on changes in the organization's operating environment, new threats, and evolving vulnerabilities.

Step Description Application in September 14th Attack Risk Identification Identifying potential threats to security and assets. - Identified Threats: Protests, unauthorized access, arson, vandalism. Critical Assets: Students, staff, buildings, data. Risk Analysis Assessing the likelihood and impact of identified risks using qualitative and quantitative methods. - Likelihood: High probability of protest-related violence. - Impact: Severe damage to property, potential harm to individuals. Risk Evaluation Prioritizing risks based on their analysis to determine which require immediate action. - Prioritized Risks: Protest-related violence (High likelihood, High impact). Secondary Risks: Vandalism, arson (Medium likelihood, Medium impact). Risk Treatment Implementing measures to mitigate, transfer, accept, or avoid risks. - Mitigation Measures: Early dismissal of students, increased patrols, collaboration with third-party security. Emergency Plan: Lockdown protocols. Monitoring and Review Continuously monitoring risks and reviewing the effectiveness of treatment measures. - Ongoing Actions: Regular updates to threat assessments, continuous monitoring of regional security climate, post-incident review and adjustment of protocols.

American School continues to thrive in Tunis! The American Cooperative School of Tunis (ACST) is a 600-student international school serving students from pre-kindergarten through 12th grade.