SlideShare a Scribd company logo
1 of 26
Download to read offline
TERRORISM MODELING AND
RISK MANAGEMENT

Chris Folkman
Director, Model Product Management

February 11, 2014
OUTLINE

•  Terrorism Modeling Overview
•  Event frequency in probabilistic terrorism
modeling
•  Modeling Framework
§ 
§ 
§ 
§ 

Exposure
Hazard
Vulnerability
Probabilistic Framework

•  TRIA implications in terrorism risk
management
TERRORISM
MODEL
BACKGROUND

•  September 11th, 2001 attacks: $40 billion insured
loss. WTC attack footprint: 16 acres.
•  Models created in 2002-2003 in response to market
demand for terrorism solutions.
•  Terrorism modeling data has improved over the past
decade.
Ø 
Ø 
Ø 
Ø 

More data on plot frequency
More data on attack suppression / success rates
More insight into countersecurity
Better calibration of hazard and vulnerability
TERRORISM RISK MANAGEMENT – A “THREE PRONGED”
APPROACH
EXPOSURE MANAGEMENT

SCENARIO LOSS MODELING

PROBABILISTIC LOSS MODELING

§  Monitor exposure
concentrations around high risk
targets.

§  Quantify loss for one attack
scenario.

§  Identify most critical attack
scenarios for a portfolio

§  Manage losses of benchmark
scenarios to acceptable levels.

§  Determine relative likelihood
of attack scenarios

§  Submitted to rating agencies
(i.e. Best SRQ).

§  Calculate impact of multiple
attacks as part of a single
event (multiplicity).

§  Identify building level
accumulations.
§  Identify exposure “Hot Spots”
within given radius.
PROBABILISTIC
MODELING OF
TERRORISM

Probabilistic terrorism modeling delivers deep insight into
key drivers of loss on a portfolio
Ø  Analysis of comprehensive event catalog (90,000+ attacks).
Ø  Key losses by account, location, target type, city, and line of
business
Ø  Assist underwriters in risk selection
Ø  Design and implement underwriting guidelines
Ø  Capacity allocation
Ø  Evaluate reinsurance needs and options
TERRORISM
FREQUENCY:
COMMON
MISPERCEPTIONS

“There’s not enough data to create
meaningful rates”
• 

RMS rates are based on empirical data, not judgment.

• 

RMS frequency is calibrated against hundreds of plots from open
source intelligence - known, intercepted, and/or resulting in court
convictions – to set the baseline threat level for each country.

• 

Event rates are scaled with data based on:
•  Attack mode
•  Target category
•  City

• 

As the threat landscape changes, so does frequency.
TERRORISM
FREQUENCY:
COMMON
MISPERCEPTIONS

“You can’t model human behavior”
• 

RMS does not model human behavior.

• 

Terrorism modeled as a control process: terrorists’ actions are
constrained by countersecurity measures.

• 

Terrorists are rational actors. Targeting strategy is based on
maximizing “attack leverage”.

• 

Suppression and interdiction rates based on data from open
source intelligence, court convictions, DHS disbursements.

• 

Range of outcomes from conventional terrorism is narrow:
Ø  Multiple successive terrorist events: not plausible due to
suppressive law enforcement action following the first
event.
Ø  Multiple hurricanes making landfall (i.e. 2004, Florida):
plausible.
PROBABILISTIC
TERRORISM
MODELING

All carriers writing terrorism cover are
making assumptions about frequency.
• 

These assumptions should be informed by data, not guesswork.

• 

RMS model incorporates dozens of data sources in frequency
calibration:

Terrorism Plots

ü  Terrorism court convictions
ü  Intercepted plots
ü  Open source intelligence

Strength of
ü  DHS disbursements
Countersecurity ü  Municipal anti-terror resources
Environment
ü 
ü 
Target Selection ü 
ü 

Gross municipal product of city
City name recognition in middle east
Symbolic value of target
Building level security perimeters
FRAMEWORK FOR TERRORISM MODELING

EXPOSURE AT RISK

QUANTIFY HAZARD

ASSESS VULNERABILITY

PROBABILISTIC ANALYSIS
IMPORTANCE OF
ADDRESS
RESOLUTION
ZIP Code Centroid
10017

Exposure at
Risk

Assess
Vulnerability

Probabilistic
Analysis

Concentrated nature of terrorism risk demands
accurate and high resolution exposure data
• 
• 
• 
• 
• 

United
Nations

Quantify
Hazard

All addresses geocoded to lat-long before modeling
Post code centroid is insufficient
Large variations of risk exist within a single post code
Hazard and vulnerability not averaged across a larger area
Data quality is paramount
ATTACK MODES
MODELED

Exposure at
Risk

Quantify
Hazard

Assess
Vulnerability

Probabilistic
Analysis

600 lb Car Bomb
1 ton Minivan Bomb

Sabotage Attacks

2 ton Box Van Bomb

Chemical Agent Attack

5 ton Truck Bomb
Biological Agent Attack
10 ton Trailer Bomb
Radiological Attack
Tanker Conflagration Attack

Nuclear Weapon

Aircraft Impact Attack
Various wind speeds, isotopes, and indoor/outdoor options
apply
HAZARD BY
ATTACK TYPE

Exposure at
Risk

Quantify
Hazard

Assess
Vulnerability

ATTACK MODES

HAZARD DESCRIPTION

Conventional Bomb Attacks

Blast pressure (PSI)

Hazardous Transportation Sabotage,
Industrial Sabotage - Toxic Release

Particulate
contamination

Aircraft Impact

Distance from target

Biological / Chemical Attack (Outdoor)

Dosage / deposition
of contaminant

Conflagration

Fire ignitions

Dirty Bomb, Nuclear Plant Sabotage

Radiation level

Probabilistic
Analysis
SIMPLE
DAMAGE
FOOTPRINT

Exposure at
Risk

Quantify
Hazard

Assess
Vulnerability

Bomb blast in
downtown Manhattan
NY Accumulation Centroid

Hazard rings represent blast
pressure dissipating as it
moves away from the centroid
Exposure
Highest

0

125

250

500
Meters

Lowest
Accum. Center

Probabilistic
Analysis
HIGH
RESOLUTION
FOOTPRINT

Exposure at
Risk

Quantify
Hazard

Assess
Vulnerability

Probabilistic
Analysis

Large Anthrax
release in downtown
Chicago
Better reflects local
environment and
orientation of footprint

Anthrax
Contamination

Downtown Chicago

Highest

Lowest

0

2.5

5

10

15

20
Miles
VULNERABILITY
OF TERRORIST
ATTACKS

Exposure at
Risk

Quantify
Hazard

Assess
Vulnerability

Probabilistic
Analysis

Represent the relationship between level of hazard
and damage
§ 

Effects on property, disruption of services, injury, and
loss of life

§ 

Expressed as mean damage ratio (MDR) or mean
casualty rate (MCR)

§ 

Vulnerability functions by building construction and
height.
MEAN DAMAGE
RATIO BY
DISTANCE TO
TARGET

Quantify
Hazard

Assess
Vulnerability

Probabilistic
Analysis

2	
  Ton	
  Bomb	
  Scenario	
  
Unknown	
  Construc3on	
  /	
  Height	
  

Mean	
  Damage	
  Ra*o	
  (%)	
  

Vulnerability varies
by building
characteristics.

Exposure at
Risk

Reinforced	
  Masonry	
  -­‐	
  High	
  (8-­‐14)	
  
Steel	
  Structure	
  -­‐	
  V	
  Tall	
  
Unknown	
  Construc3on	
  -­‐	
  Tall	
  

75	
  

100	
  

150	
  

250	
  

Distance	
  to	
  A4ack	
  Centroid	
  (meters)	
  

400	
  
FIRE
LOSSES

Exposure at
Risk

Quantify
Hazard

Assess
Vulnerability

Probabilistic
Analysis

Standard Fire Policy (SFP): In U.S., many states
require that fire following terrorism be included in
property coverage.
Explicit quantification of fire-related damages is critical
for selected attack modes:

Mitsubishi Steel and Armament Works
~ 700 meters from hypocenter, Nagasaki
From: www.hiroshima-remembered.com

§ 
§ 
§ 
§ 
§ 

Bombs
Aircraft Impact
Conflagration
Industrial Sabotage
Nuclear
TERRORIST
TARGET
DEVELOPMENT

Exposure at
Risk

Quantify
Hazard

Assess
Vulnerability

Probabilistic
Analysis

Terrorist target selection based on maximizing attack
leverage.
Criteria for targets based on:
§ 
§ 
§ 

Economic Impact
Symbolic Value / Publicity Value
Casualties

§ 
§ 
§ 
§ 

Debriefings of Operatives
Historical Attack Patterns
Known Planned Attacks
Intelligence Reports and Expert Opinions
COMPONENTS OF
TERRORISM RATES

Exposure at
Risk

Quantify
Hazard

Assess
Vulnerability

Probabilistic
Analysis

•  Attack Frequency
Ø  Country Specific
Ø  Plots à Attacks
Ø  Recalibrated frequently

•  Conditional Probability.

Given that an attack

occurs, what is its likelihood by:
Ø  Type of attack
Ø  Type of target
Ø  City

•  Attack Multiplicity
Ø  Multiple attacks = One Event
From the Congressional Research Service, April 2013:

TRIA
STRUCTURE
TRIA RENEWAL
EFFORTS
Political Challenges

Key Support

Non-renewal impacts

•  House financial committee
has 46% new membership
since last TRIA renewal.
•  Aversion to perceived “bail
out” legislation persists.
•  TRIA backstop provided
without charge, premium
collected without incident.

•  Strong, united lobby from
banking, insurance, and
construction industries to
promote TRIA renewal.
•  Renewal proposed 3 times
in congress in 2013, by
members of both parties.

•  Moody’s downgrades in
2002.
•  Sunset clauses in 2005:
delayed / halted lending and
construction.
•  Capacity shortage, large
rate increases.
•  RMS top five cities for
terrorism risk: New York,
Washington, Chicago, San
Francisco, Los Angeles.
TRIA
CONSIDERATIONS

Propor*on	
  of	
  Average	
  Annual	
  Terrorism	
  Loss	
  	
  
by	
  Metropolitan	
  area	
  
Los	
  Angeles	
  
San	
  Francisco	
  

The terrorism threat
gradient is steep: 75%
of AAL is in five metro
areas.

Washington	
  	
  
DC	
  

Rest	
  of	
  U.S.	
  

Chicago	
  

New	
  York	
  
RMS U.S. Industry Loss Curves by Peril

TRIA
CONSIDERATIONS

600,000	
  

500,000	
  

400,000	
  

$ Millions

Terrorism risk is
comparable
with nat cat risk.

250 Year
1,000 Year

300,000	
  

5,000 Year
200,000	
  

100,000	
  

0	
  

Winterstorm

Terrorism

Earthquake
+ Fire

Hurricane

Convective
Storm
TRIA
CONSIDERATIONS
Event	
  Descrip*on	
  
Nuclear	
  Detona*on,	
  	
  
5	
  kiloton	
  yield,	
  Chicago	
  
Nuclear	
  Detona*on	
  ,	
  
1	
  kiloton	
  yield,	
  Los	
  Angeles	
  
Anthrax	
  a4ack,	
  75	
  kg	
  anthrax	
  
slurry,	
  Philadephia	
  
Nuclear	
  Power	
  Plant	
  Sabotage,	
  
Illinois	
  
Dirty	
  Bomb,	
  15,000	
  curies	
  
cesium-­‐137,	
  New	
  York	
  
Anthrax	
  a4ack,	
  1	
  kg	
  anthrax	
  
slurry,	
  Philadephia	
  
Sarin	
  Gas	
  A4ack,	
  1,000	
  kg	
  
release,	
  New	
  York	
  

NBCR severity makes it difficult to insure	
  
Total	
  Loss	
  
($Billions)	
  

Property	
  Damage	
  
Loss	
  ($Billions)	
  

Workers'	
  Comp	
  
Loss	
  ($Billions)	
  

Fatali*es	
  

$530	
  

$323	
  

$207	
  

300,000	
  

$230	
  

$163	
  

$67	
  

110,000	
  

$216	
  

$125	
  

$91	
  

60,000	
  

$148	
  

$146	
  

$2	
  

Few	
  

$127	
  

$127	
  

$0.1	
  

Few	
  

$44	
  

$26	
  

$18	
  

10,000	
  

$17	
  

$12	
  

$5	
  

2,000	
  
TRIA RENEWAL:
WHAT’S AT STAKE

•  Market Capacity
Ø  Evan Greenberg, CEO ACE Ltd: “I wouldn’t make
[terrorism cover] available, nor would any other company
that I know of.”

•  Workers’ Compensation
Ø  Terrorism cannot be excluded
Ø  Residual markets can be >50% more expensive than
private carriers

•  Commercial Development
Ø  Loan Covenants require terrorism cover
Ø  Moody’s: $4.5 billion in mortgage securities downgraded
(2002) due to lack of terrorism insurance.
• 

All terrorism writers make assumptions on event frequency.
•  Assumptions should be based on data.
•  Probabilistic terrorism modeling allows most comprehensive
view of risk.

• 

Terrorists are rational actors whose targeting selections align with
principals maximizing “attack leverage”

• 

Best practice: Use multiple approaches to best triangulate terrorism risk
•  Exposure management
•  Deterministic scenarios
•  Probabilistic modeling

• 

Location-level data quality is important due to small event footprints

• 

Terrorism risk is comparable with nat cat risk.

• 

Terrorism risk can be successfully modeled. Insuring it remains difficult.

TAKE AWAYS

More Related Content

What's hot

Bioburden Testing
Bioburden TestingBioburden Testing
Bioburden TestingDocKetchum
 
Safety management
Safety managementSafety management
Safety managementSrini Vasan
 
Electrical Hazards and their safety
Electrical Hazards and their safetyElectrical Hazards and their safety
Electrical Hazards and their safetyMoxit Khandhar
 
Industry risk assessment and risk managemnt
Industry risk assessment and risk managemntIndustry risk assessment and risk managemnt
Industry risk assessment and risk managemntMd Niamul Islam
 
Classification, Morphology and Methods for the detection of Viruses
Classification, Morphology and Methods for the detection of VirusesClassification, Morphology and Methods for the detection of Viruses
Classification, Morphology and Methods for the detection of VirusesDr. Rakesh Prasad Sah
 
Confocal laser scanning microscopy (clsm)
Confocal laser scanning microscopy (clsm)Confocal laser scanning microscopy (clsm)
Confocal laser scanning microscopy (clsm)Nethravathi Siri
 
Fire and explosion
Fire and explosionFire and explosion
Fire and explosionmaac44
 
Layer of protection analysis
Layer of protection analysisLayer of protection analysis
Layer of protection analysisSandip Sonawane
 
Industrial Safety Training by Author Stream
Industrial Safety Training by Author StreamIndustrial Safety Training by Author Stream
Industrial Safety Training by Author StreamAtlantic Training, LLC.
 
Recent advancement in microscopic techniques cryoem and super
Recent advancement in microscopic techniques  cryoem and superRecent advancement in microscopic techniques  cryoem and super
Recent advancement in microscopic techniques cryoem and superDanishNigar
 

What's hot (20)

Bioburden Testing
Bioburden TestingBioburden Testing
Bioburden Testing
 
Safety management
Safety managementSafety management
Safety management
 
Electrical Hazards and their safety
Electrical Hazards and their safetyElectrical Hazards and their safety
Electrical Hazards and their safety
 
Industry risk assessment and risk managemnt
Industry risk assessment and risk managemntIndustry risk assessment and risk managemnt
Industry risk assessment and risk managemnt
 
lab safety
 lab safety  lab safety
lab safety
 
Classification, Morphology and Methods for the detection of Viruses
Classification, Morphology and Methods for the detection of VirusesClassification, Morphology and Methods for the detection of Viruses
Classification, Morphology and Methods for the detection of Viruses
 
Bacteria
BacteriaBacteria
Bacteria
 
Ppt f1
Ppt f1Ppt f1
Ppt f1
 
Accident Investigation
Accident InvestigationAccident Investigation
Accident Investigation
 
Bacteria ppt
Bacteria pptBacteria ppt
Bacteria ppt
 
Industrial safety unit iv ppt
Industrial safety unit iv pptIndustrial safety unit iv ppt
Industrial safety unit iv ppt
 
Confocal laser scanning microscopy (clsm)
Confocal laser scanning microscopy (clsm)Confocal laser scanning microscopy (clsm)
Confocal laser scanning microscopy (clsm)
 
Fire and explosion
Fire and explosionFire and explosion
Fire and explosion
 
Layer of protection analysis
Layer of protection analysisLayer of protection analysis
Layer of protection analysis
 
Industrial Safety Training by Author Stream
Industrial Safety Training by Author StreamIndustrial Safety Training by Author Stream
Industrial Safety Training by Author Stream
 
Recent advancement in microscopic techniques cryoem and super
Recent advancement in microscopic techniques  cryoem and superRecent advancement in microscopic techniques  cryoem and super
Recent advancement in microscopic techniques cryoem and super
 
SAFETY COMMITTEE.pdf
SAFETY COMMITTEE.pdfSAFETY COMMITTEE.pdf
SAFETY COMMITTEE.pdf
 
Confocal microscopy
Confocal microscopyConfocal microscopy
Confocal microscopy
 
PPE HAZARD ASSESSMENT FORM
PPE HAZARD ASSESSMENT FORMPPE HAZARD ASSESSMENT FORM
PPE HAZARD ASSESSMENT FORM
 
Biohazard
BiohazardBiohazard
Biohazard
 

Viewers also liked

Millennium Project Real-Time Delphi priorities for 2016-17
Millennium Project Real-Time Delphi priorities for 2016-17Millennium Project Real-Time Delphi priorities for 2016-17
Millennium Project Real-Time Delphi priorities for 2016-17Jerome Glenn
 
Reasons to migrate to Delphi XE
Reasons to migrate to Delphi XEReasons to migrate to Delphi XE
Reasons to migrate to Delphi XEAndreano Lanusse
 
Terrorism Risk in 2015: Issues and Perspectives
Terrorism Risk in 2015: Issues and PerspectivesTerrorism Risk in 2015: Issues and Perspectives
Terrorism Risk in 2015: Issues and PerspectivesRMS
 
A Global Horizon Scanning System and NATO workshop: Inentification of Potenti...
A Global Horizon Scanning System and NATO workshop: Inentification of Potenti...A Global Horizon Scanning System and NATO workshop: Inentification of Potenti...
A Global Horizon Scanning System and NATO workshop: Inentification of Potenti...Jerome Glenn
 
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the FutureNATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the FutureJerome Glenn
 
Environmental scanning & Monitoring Techniques
Environmental scanning & Monitoring TechniquesEnvironmental scanning & Monitoring Techniques
Environmental scanning & Monitoring TechniquesRex Mannoor
 
Environmental scanning
Environmental scanningEnvironmental scanning
Environmental scanningRajesh kumar
 

Viewers also liked (9)

Millennium Project Real-Time Delphi priorities for 2016-17
Millennium Project Real-Time Delphi priorities for 2016-17Millennium Project Real-Time Delphi priorities for 2016-17
Millennium Project Real-Time Delphi priorities for 2016-17
 
Reasons to migrate to Delphi XE
Reasons to migrate to Delphi XEReasons to migrate to Delphi XE
Reasons to migrate to Delphi XE
 
Terrorism Risk in 2015: Issues and Perspectives
Terrorism Risk in 2015: Issues and PerspectivesTerrorism Risk in 2015: Issues and Perspectives
Terrorism Risk in 2015: Issues and Perspectives
 
A Global Horizon Scanning System and NATO workshop: Inentification of Potenti...
A Global Horizon Scanning System and NATO workshop: Inentification of Potenti...A Global Horizon Scanning System and NATO workshop: Inentification of Potenti...
A Global Horizon Scanning System and NATO workshop: Inentification of Potenti...
 
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the FutureNATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
 
Weak Signals and Wild Cards
Weak Signals and Wild CardsWeak Signals and Wild Cards
Weak Signals and Wild Cards
 
Dr Harry Woodroof: Introduction to Horizon Scanning
Dr Harry Woodroof: Introduction to Horizon ScanningDr Harry Woodroof: Introduction to Horizon Scanning
Dr Harry Woodroof: Introduction to Horizon Scanning
 
Environmental scanning & Monitoring Techniques
Environmental scanning & Monitoring TechniquesEnvironmental scanning & Monitoring Techniques
Environmental scanning & Monitoring Techniques
 
Environmental scanning
Environmental scanningEnvironmental scanning
Environmental scanning
 

Similar to "Terrorism Modeling & Risk Management" - Presented at the RAA's Cat Modeling Conference 2014

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVIftach Ian Amit
 
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxAppendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxjustine1simpson78276
 
Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalredacooil
 
Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalredacooil
 
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptxCapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptxCapitolTechU
 
The evolution of terrorism after paris
The evolution of terrorism after parisThe evolution of terrorism after paris
The evolution of terrorism after parisGraeme Cross
 
A Study for Development of Regional Risk Assessment for Technological Disaster
A Study for Development of Regional Risk Assessment for Technological DisasterA Study for Development of Regional Risk Assessment for Technological Disaster
A Study for Development of Regional Risk Assessment for Technological DisasterGlobal Risk Forum GRFDavos
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsPriyanka Aash
 
Trust, Privacy and Biometrics
Trust, Privacy and BiometricsTrust, Privacy and Biometrics
Trust, Privacy and Biometricsblogzilla
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMADavid Sweigert
 
Improving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceImproving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceNorman Johnson
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedSusanaFurman449
 
RUNNING HEADER AIRPORT PART 1 .docx
RUNNING HEADER AIRPORT PART 1                                    .docxRUNNING HEADER AIRPORT PART 1                                    .docx
RUNNING HEADER AIRPORT PART 1 .docxagnesdcarey33086
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentPECB
 
Accidents and injuries
Accidents and injuriesAccidents and injuries
Accidents and injuriesJui Mandal
 

Similar to "Terrorism Modeling & Risk Management" - Presented at the RAA's Cat Modeling Conference 2014 (20)

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLV
 
RISK MANAGEMENT
RISK MANAGEMENTRISK MANAGEMENT
RISK MANAGEMENT
 
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxAppendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
 
Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalre
 
Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalre
 
weapon of mass destruction
weapon of mass destructionweapon of mass destruction
weapon of mass destruction
 
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptxCapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
 
The evolution of terrorism after paris
The evolution of terrorism after parisThe evolution of terrorism after paris
The evolution of terrorism after paris
 
Mark Lynch - Importance of Big Data and Analytics for the Insurance Market
Mark Lynch - Importance of Big Data and Analytics for the Insurance MarketMark Lynch - Importance of Big Data and Analytics for the Insurance Market
Mark Lynch - Importance of Big Data and Analytics for the Insurance Market
 
A Study for Development of Regional Risk Assessment for Technological Disaster
A Study for Development of Regional Risk Assessment for Technological DisasterA Study for Development of Regional Risk Assessment for Technological Disaster
A Study for Development of Regional Risk Assessment for Technological Disaster
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security Controls
 
Trust, Privacy and Biometrics
Trust, Privacy and BiometricsTrust, Privacy and Biometrics
Trust, Privacy and Biometrics
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
PSA - Lezione 28 ottobre 2014 - RISK
PSA - Lezione 28 ottobre 2014 - RISKPSA - Lezione 28 ottobre 2014 - RISK
PSA - Lezione 28 ottobre 2014 - RISK
 
Improving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceImproving cyber security using biosecurity experience
Improving cyber security using biosecurity experience
 
Stu w22 b
Stu w22 bStu w22 b
Stu w22 b
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
 
RUNNING HEADER AIRPORT PART 1 .docx
RUNNING HEADER AIRPORT PART 1                                    .docxRUNNING HEADER AIRPORT PART 1                                    .docx
RUNNING HEADER AIRPORT PART 1 .docx
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk Assessment
 
Accidents and injuries
Accidents and injuriesAccidents and injuries
Accidents and injuries
 

More from RMS

Risk on the Rise: Counting the Cost of Inland Flooding
Risk on the Rise: Counting the Cost of Inland FloodingRisk on the Rise: Counting the Cost of Inland Flooding
Risk on the Rise: Counting the Cost of Inland FloodingRMS
 
Owning Your View of Risk in a Changing Market
Owning Your View of Risk in a Changing MarketOwning Your View of Risk in a Changing Market
Owning Your View of Risk in a Changing MarketRMS
 
Risk on the Rise: Managing Inland Flood Risk
Risk on the Rise: Managing Inland Flood RiskRisk on the Rise: Managing Inland Flood Risk
Risk on the Rise: Managing Inland Flood RiskRMS
 
Risk on the Rise: Understanding and Managing Coastal Flood Risk
Risk on the Rise: Understanding and Managing Coastal Flood RiskRisk on the Rise: Understanding and Managing Coastal Flood Risk
Risk on the Rise: Understanding and Managing Coastal Flood RiskRMS
 
The Big Picture on Flood Modeling Webinar
The Big Picture on Flood Modeling WebinarThe Big Picture on Flood Modeling Webinar
The Big Picture on Flood Modeling WebinarRMS
 
Boston’s New Big Dig: How does U.S. winter storm risk impact your portfolio?
Boston’s New Big Dig: How does U.S. winter storm risk impact your portfolio?Boston’s New Big Dig: How does U.S. winter storm risk impact your portfolio?
Boston’s New Big Dig: How does U.S. winter storm risk impact your portfolio?RMS
 
#StumpStumpo: Challenge RMS to model any re/insurance contract in RMS's Contr...
#StumpStumpo: Challenge RMS to model any re/insurance contract in RMS's Contr...#StumpStumpo: Challenge RMS to model any re/insurance contract in RMS's Contr...
#StumpStumpo: Challenge RMS to model any re/insurance contract in RMS's Contr...RMS
 
"The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014
"The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014 "The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014
"The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014 RMS
 
"U.S. Flood Modeling" - Presented at the RAA's Cat Modeling Conference 2014
"U.S. Flood Modeling" - Presented at the RAA's Cat Modeling Conference 2014"U.S. Flood Modeling" - Presented at the RAA's Cat Modeling Conference 2014
"U.S. Flood Modeling" - Presented at the RAA's Cat Modeling Conference 2014RMS
 
RMS Infographic on Hurricane and Storm Surge Risk
RMS Infographic on Hurricane and Storm Surge RiskRMS Infographic on Hurricane and Storm Surge Risk
RMS Infographic on Hurricane and Storm Surge RiskRMS
 
ABI (Association of British Insurers) - Industry Good Practice for Cat Modell...
ABI (Association of British Insurers) - Industry Good Practice for Cat Modell...ABI (Association of British Insurers) - Industry Good Practice for Cat Modell...
ABI (Association of British Insurers) - Industry Good Practice for Cat Modell...RMS
 
'Secondary perils?' Impact of non-modeled risks to the insurance industry in ...
'Secondary perils?' Impact of non-modeled risks to the insurance industry in ...'Secondary perils?' Impact of non-modeled risks to the insurance industry in ...
'Secondary perils?' Impact of non-modeled risks to the insurance industry in ...RMS
 
Resilient Risk Management
Resilient Risk ManagementResilient Risk Management
Resilient Risk ManagementRMS
 
Modeling Insured Exposures Against the Next Southeast Asian Catastrophe - Mar...
Modeling Insured Exposures Against the Next Southeast Asian Catastrophe - Mar...Modeling Insured Exposures Against the Next Southeast Asian Catastrophe - Mar...
Modeling Insured Exposures Against the Next Southeast Asian Catastrophe - Mar...RMS
 
Introduction to the cloud
Introduction to the cloudIntroduction to the cloud
Introduction to the cloudRMS
 

More from RMS (15)

Risk on the Rise: Counting the Cost of Inland Flooding
Risk on the Rise: Counting the Cost of Inland FloodingRisk on the Rise: Counting the Cost of Inland Flooding
Risk on the Rise: Counting the Cost of Inland Flooding
 
Owning Your View of Risk in a Changing Market
Owning Your View of Risk in a Changing MarketOwning Your View of Risk in a Changing Market
Owning Your View of Risk in a Changing Market
 
Risk on the Rise: Managing Inland Flood Risk
Risk on the Rise: Managing Inland Flood RiskRisk on the Rise: Managing Inland Flood Risk
Risk on the Rise: Managing Inland Flood Risk
 
Risk on the Rise: Understanding and Managing Coastal Flood Risk
Risk on the Rise: Understanding and Managing Coastal Flood RiskRisk on the Rise: Understanding and Managing Coastal Flood Risk
Risk on the Rise: Understanding and Managing Coastal Flood Risk
 
The Big Picture on Flood Modeling Webinar
The Big Picture on Flood Modeling WebinarThe Big Picture on Flood Modeling Webinar
The Big Picture on Flood Modeling Webinar
 
Boston’s New Big Dig: How does U.S. winter storm risk impact your portfolio?
Boston’s New Big Dig: How does U.S. winter storm risk impact your portfolio?Boston’s New Big Dig: How does U.S. winter storm risk impact your portfolio?
Boston’s New Big Dig: How does U.S. winter storm risk impact your portfolio?
 
#StumpStumpo: Challenge RMS to model any re/insurance contract in RMS's Contr...
#StumpStumpo: Challenge RMS to model any re/insurance contract in RMS's Contr...#StumpStumpo: Challenge RMS to model any re/insurance contract in RMS's Contr...
#StumpStumpo: Challenge RMS to model any re/insurance contract in RMS's Contr...
 
"The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014
"The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014 "The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014
"The RMS Cloud" - Presented at the RAA's Cat Modeling Conference 2014
 
"U.S. Flood Modeling" - Presented at the RAA's Cat Modeling Conference 2014
"U.S. Flood Modeling" - Presented at the RAA's Cat Modeling Conference 2014"U.S. Flood Modeling" - Presented at the RAA's Cat Modeling Conference 2014
"U.S. Flood Modeling" - Presented at the RAA's Cat Modeling Conference 2014
 
RMS Infographic on Hurricane and Storm Surge Risk
RMS Infographic on Hurricane and Storm Surge RiskRMS Infographic on Hurricane and Storm Surge Risk
RMS Infographic on Hurricane and Storm Surge Risk
 
ABI (Association of British Insurers) - Industry Good Practice for Cat Modell...
ABI (Association of British Insurers) - Industry Good Practice for Cat Modell...ABI (Association of British Insurers) - Industry Good Practice for Cat Modell...
ABI (Association of British Insurers) - Industry Good Practice for Cat Modell...
 
'Secondary perils?' Impact of non-modeled risks to the insurance industry in ...
'Secondary perils?' Impact of non-modeled risks to the insurance industry in ...'Secondary perils?' Impact of non-modeled risks to the insurance industry in ...
'Secondary perils?' Impact of non-modeled risks to the insurance industry in ...
 
Resilient Risk Management
Resilient Risk ManagementResilient Risk Management
Resilient Risk Management
 
Modeling Insured Exposures Against the Next Southeast Asian Catastrophe - Mar...
Modeling Insured Exposures Against the Next Southeast Asian Catastrophe - Mar...Modeling Insured Exposures Against the Next Southeast Asian Catastrophe - Mar...
Modeling Insured Exposures Against the Next Southeast Asian Catastrophe - Mar...
 
Introduction to the cloud
Introduction to the cloudIntroduction to the cloud
Introduction to the cloud
 

Recently uploaded

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 

Recently uploaded (20)

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 

"Terrorism Modeling & Risk Management" - Presented at the RAA's Cat Modeling Conference 2014

  • 1. TERRORISM MODELING AND RISK MANAGEMENT Chris Folkman Director, Model Product Management February 11, 2014
  • 2. OUTLINE •  Terrorism Modeling Overview •  Event frequency in probabilistic terrorism modeling •  Modeling Framework §  §  §  §  Exposure Hazard Vulnerability Probabilistic Framework •  TRIA implications in terrorism risk management
  • 3. TERRORISM MODEL BACKGROUND •  September 11th, 2001 attacks: $40 billion insured loss. WTC attack footprint: 16 acres. •  Models created in 2002-2003 in response to market demand for terrorism solutions. •  Terrorism modeling data has improved over the past decade. Ø  Ø  Ø  Ø  More data on plot frequency More data on attack suppression / success rates More insight into countersecurity Better calibration of hazard and vulnerability
  • 4. TERRORISM RISK MANAGEMENT – A “THREE PRONGED” APPROACH EXPOSURE MANAGEMENT SCENARIO LOSS MODELING PROBABILISTIC LOSS MODELING §  Monitor exposure concentrations around high risk targets. §  Quantify loss for one attack scenario. §  Identify most critical attack scenarios for a portfolio §  Manage losses of benchmark scenarios to acceptable levels. §  Determine relative likelihood of attack scenarios §  Submitted to rating agencies (i.e. Best SRQ). §  Calculate impact of multiple attacks as part of a single event (multiplicity). §  Identify building level accumulations. §  Identify exposure “Hot Spots” within given radius.
  • 5. PROBABILISTIC MODELING OF TERRORISM Probabilistic terrorism modeling delivers deep insight into key drivers of loss on a portfolio Ø  Analysis of comprehensive event catalog (90,000+ attacks). Ø  Key losses by account, location, target type, city, and line of business Ø  Assist underwriters in risk selection Ø  Design and implement underwriting guidelines Ø  Capacity allocation Ø  Evaluate reinsurance needs and options
  • 6. TERRORISM FREQUENCY: COMMON MISPERCEPTIONS “There’s not enough data to create meaningful rates” •  RMS rates are based on empirical data, not judgment. •  RMS frequency is calibrated against hundreds of plots from open source intelligence - known, intercepted, and/or resulting in court convictions – to set the baseline threat level for each country. •  Event rates are scaled with data based on: •  Attack mode •  Target category •  City •  As the threat landscape changes, so does frequency.
  • 7. TERRORISM FREQUENCY: COMMON MISPERCEPTIONS “You can’t model human behavior” •  RMS does not model human behavior. •  Terrorism modeled as a control process: terrorists’ actions are constrained by countersecurity measures. •  Terrorists are rational actors. Targeting strategy is based on maximizing “attack leverage”. •  Suppression and interdiction rates based on data from open source intelligence, court convictions, DHS disbursements. •  Range of outcomes from conventional terrorism is narrow: Ø  Multiple successive terrorist events: not plausible due to suppressive law enforcement action following the first event. Ø  Multiple hurricanes making landfall (i.e. 2004, Florida): plausible.
  • 8. PROBABILISTIC TERRORISM MODELING All carriers writing terrorism cover are making assumptions about frequency. •  These assumptions should be informed by data, not guesswork. •  RMS model incorporates dozens of data sources in frequency calibration: Terrorism Plots ü  Terrorism court convictions ü  Intercepted plots ü  Open source intelligence Strength of ü  DHS disbursements Countersecurity ü  Municipal anti-terror resources Environment ü  ü  Target Selection ü  ü  Gross municipal product of city City name recognition in middle east Symbolic value of target Building level security perimeters
  • 9. FRAMEWORK FOR TERRORISM MODELING EXPOSURE AT RISK QUANTIFY HAZARD ASSESS VULNERABILITY PROBABILISTIC ANALYSIS
  • 10. IMPORTANCE OF ADDRESS RESOLUTION ZIP Code Centroid 10017 Exposure at Risk Assess Vulnerability Probabilistic Analysis Concentrated nature of terrorism risk demands accurate and high resolution exposure data •  •  •  •  •  United Nations Quantify Hazard All addresses geocoded to lat-long before modeling Post code centroid is insufficient Large variations of risk exist within a single post code Hazard and vulnerability not averaged across a larger area Data quality is paramount
  • 11. ATTACK MODES MODELED Exposure at Risk Quantify Hazard Assess Vulnerability Probabilistic Analysis 600 lb Car Bomb 1 ton Minivan Bomb Sabotage Attacks 2 ton Box Van Bomb Chemical Agent Attack 5 ton Truck Bomb Biological Agent Attack 10 ton Trailer Bomb Radiological Attack Tanker Conflagration Attack Nuclear Weapon Aircraft Impact Attack Various wind speeds, isotopes, and indoor/outdoor options apply
  • 12. HAZARD BY ATTACK TYPE Exposure at Risk Quantify Hazard Assess Vulnerability ATTACK MODES HAZARD DESCRIPTION Conventional Bomb Attacks Blast pressure (PSI) Hazardous Transportation Sabotage, Industrial Sabotage - Toxic Release Particulate contamination Aircraft Impact Distance from target Biological / Chemical Attack (Outdoor) Dosage / deposition of contaminant Conflagration Fire ignitions Dirty Bomb, Nuclear Plant Sabotage Radiation level Probabilistic Analysis
  • 13. SIMPLE DAMAGE FOOTPRINT Exposure at Risk Quantify Hazard Assess Vulnerability Bomb blast in downtown Manhattan NY Accumulation Centroid Hazard rings represent blast pressure dissipating as it moves away from the centroid Exposure Highest 0 125 250 500 Meters Lowest Accum. Center Probabilistic Analysis
  • 14. HIGH RESOLUTION FOOTPRINT Exposure at Risk Quantify Hazard Assess Vulnerability Probabilistic Analysis Large Anthrax release in downtown Chicago Better reflects local environment and orientation of footprint Anthrax Contamination Downtown Chicago Highest Lowest 0 2.5 5 10 15 20 Miles
  • 15. VULNERABILITY OF TERRORIST ATTACKS Exposure at Risk Quantify Hazard Assess Vulnerability Probabilistic Analysis Represent the relationship between level of hazard and damage §  Effects on property, disruption of services, injury, and loss of life §  Expressed as mean damage ratio (MDR) or mean casualty rate (MCR) §  Vulnerability functions by building construction and height.
  • 16. MEAN DAMAGE RATIO BY DISTANCE TO TARGET Quantify Hazard Assess Vulnerability Probabilistic Analysis 2  Ton  Bomb  Scenario   Unknown  Construc3on  /  Height   Mean  Damage  Ra*o  (%)   Vulnerability varies by building characteristics. Exposure at Risk Reinforced  Masonry  -­‐  High  (8-­‐14)   Steel  Structure  -­‐  V  Tall   Unknown  Construc3on  -­‐  Tall   75   100   150   250   Distance  to  A4ack  Centroid  (meters)   400  
  • 17. FIRE LOSSES Exposure at Risk Quantify Hazard Assess Vulnerability Probabilistic Analysis Standard Fire Policy (SFP): In U.S., many states require that fire following terrorism be included in property coverage. Explicit quantification of fire-related damages is critical for selected attack modes: Mitsubishi Steel and Armament Works ~ 700 meters from hypocenter, Nagasaki From: www.hiroshima-remembered.com §  §  §  §  §  Bombs Aircraft Impact Conflagration Industrial Sabotage Nuclear
  • 18. TERRORIST TARGET DEVELOPMENT Exposure at Risk Quantify Hazard Assess Vulnerability Probabilistic Analysis Terrorist target selection based on maximizing attack leverage. Criteria for targets based on: §  §  §  Economic Impact Symbolic Value / Publicity Value Casualties §  §  §  §  Debriefings of Operatives Historical Attack Patterns Known Planned Attacks Intelligence Reports and Expert Opinions
  • 19. COMPONENTS OF TERRORISM RATES Exposure at Risk Quantify Hazard Assess Vulnerability Probabilistic Analysis •  Attack Frequency Ø  Country Specific Ø  Plots à Attacks Ø  Recalibrated frequently •  Conditional Probability. Given that an attack occurs, what is its likelihood by: Ø  Type of attack Ø  Type of target Ø  City •  Attack Multiplicity Ø  Multiple attacks = One Event
  • 20. From the Congressional Research Service, April 2013: TRIA STRUCTURE
  • 21. TRIA RENEWAL EFFORTS Political Challenges Key Support Non-renewal impacts •  House financial committee has 46% new membership since last TRIA renewal. •  Aversion to perceived “bail out” legislation persists. •  TRIA backstop provided without charge, premium collected without incident. •  Strong, united lobby from banking, insurance, and construction industries to promote TRIA renewal. •  Renewal proposed 3 times in congress in 2013, by members of both parties. •  Moody’s downgrades in 2002. •  Sunset clauses in 2005: delayed / halted lending and construction. •  Capacity shortage, large rate increases. •  RMS top five cities for terrorism risk: New York, Washington, Chicago, San Francisco, Los Angeles.
  • 22. TRIA CONSIDERATIONS Propor*on  of  Average  Annual  Terrorism  Loss     by  Metropolitan  area   Los  Angeles   San  Francisco   The terrorism threat gradient is steep: 75% of AAL is in five metro areas. Washington     DC   Rest  of  U.S.   Chicago   New  York  
  • 23. RMS U.S. Industry Loss Curves by Peril TRIA CONSIDERATIONS 600,000   500,000   400,000   $ Millions Terrorism risk is comparable with nat cat risk. 250 Year 1,000 Year 300,000   5,000 Year 200,000   100,000   0   Winterstorm Terrorism Earthquake + Fire Hurricane Convective Storm
  • 24. TRIA CONSIDERATIONS Event  Descrip*on   Nuclear  Detona*on,     5  kiloton  yield,  Chicago   Nuclear  Detona*on  ,   1  kiloton  yield,  Los  Angeles   Anthrax  a4ack,  75  kg  anthrax   slurry,  Philadephia   Nuclear  Power  Plant  Sabotage,   Illinois   Dirty  Bomb,  15,000  curies   cesium-­‐137,  New  York   Anthrax  a4ack,  1  kg  anthrax   slurry,  Philadephia   Sarin  Gas  A4ack,  1,000  kg   release,  New  York   NBCR severity makes it difficult to insure   Total  Loss   ($Billions)   Property  Damage   Loss  ($Billions)   Workers'  Comp   Loss  ($Billions)   Fatali*es   $530   $323   $207   300,000   $230   $163   $67   110,000   $216   $125   $91   60,000   $148   $146   $2   Few   $127   $127   $0.1   Few   $44   $26   $18   10,000   $17   $12   $5   2,000  
  • 25. TRIA RENEWAL: WHAT’S AT STAKE •  Market Capacity Ø  Evan Greenberg, CEO ACE Ltd: “I wouldn’t make [terrorism cover] available, nor would any other company that I know of.” •  Workers’ Compensation Ø  Terrorism cannot be excluded Ø  Residual markets can be >50% more expensive than private carriers •  Commercial Development Ø  Loan Covenants require terrorism cover Ø  Moody’s: $4.5 billion in mortgage securities downgraded (2002) due to lack of terrorism insurance.
  • 26. •  All terrorism writers make assumptions on event frequency. •  Assumptions should be based on data. •  Probabilistic terrorism modeling allows most comprehensive view of risk. •  Terrorists are rational actors whose targeting selections align with principals maximizing “attack leverage” •  Best practice: Use multiple approaches to best triangulate terrorism risk •  Exposure management •  Deterministic scenarios •  Probabilistic modeling •  Location-level data quality is important due to small event footprints •  Terrorism risk is comparable with nat cat risk. •  Terrorism risk can be successfully modeled. Insuring it remains difficult. TAKE AWAYS