Expert Commentary

Embassy Security Three Years After Benghazi

September 9, 2015 | Alex Tiersky
Photo: Mohammad Hannon

On the night of September 11, 2012, four Americans, including U.S. Ambassador J. Christopher Stevens, were killed in terrorist attacks at U.S. facilities in Benghazi, Libya. These attacks highlighted the highly volatile environments in which U.S. diplomatic personnel sometimes operate, and led to a period of sustained scrutiny of the measures in place to protect them.

The State Department’s Bureau of Diplomatic Security organizes security for U.S. diplomats and the facilities they work in. In addition to the first layer of defense – the protective assets provided by host nations (under their Vienna Convention commitments) – U.S. diplomatic facilities are usually guarded by some mix of elements including locally-hired guards, Diplomatic Security agents, and sometimes U.S. Marine Corps Security Guard detachments.  

Since the Benghazi attacks, State has received a significant increase in funding for embassy security measures. These congressionally-appropriated funds (on the order of an estimated $4.7 billion total for fiscal year 2015) have allowed for a staffing surge of 151 additional Diplomatic Security personnel; a program to bolster host nation security forces at high threat posts; increased pre-deployment training for diplomats on challenges such as the use of fire as a weapon; and specific technical, physical security upgrades at U.S. embassies and consulates, such as additional fire safety equipment at sensitive posts.       

Significantly, State and the Pentagon have indicated that they have reviewed crisis planning procedures and made specific changes to address potential vulnerabilities, include pre-positioning U.S. military assets to more rapidly respond to crises at diplomatic facilities in insecure locations. The Defense Department also has worked with State to increase the size of the U.S. Marine Corps Embassy Security group, including deploying additional Marines to sensitive locations and increasing the number of detachments in order to ensure presence at more posts. 

State officials say that a number of internal processes and procedures also have been scrubbed, with an eye to ensuring that diplomats sent into dangerous environments are there with resources commensurate to the challenge. A new body headed by the Assistant Secretary for Diplomatic Security assesses the global threat environment to determine which posts are termed “high threat.” These posts then are to be watched carefully by a new Directorate for High Threat Posts within the Bureau of Diplomatic Security. Decisions to open new posts in dangerous areas are now vetted through a new process known as the Vital Presence Validation Process, intended to ensure a fully considered weighing of the importance of the mission versus the risk it entails to personnel. 

What hasn’t changed since the Benghazi attacks?  Most significantly, U.S. personnel and facilities remain under threat, as demonstrated by a steady stream of incidents, including (to name only a few) the February 2013 suicide bombing at the U.S. Embassy in Ankara and the March 2015 slashing of the U.S. Ambassador in Seoul, as well as numerous incidents involving U.S. diplomatic facilities in conflict zones such as Iraq, Afghanistan, Libya, or Yemen.  

The second constant: Eliminating all threats simply isn’t an achievable goal, analysts agree, regardless of funding levels or physical security measures. The State Department will continue to operate in challenging environments as long as U.S. interests require it to do so. And attacks can (and do) occur even in those locations considered less threatened.

As a result, U.S. planners must manage risk when weighing the benefits of diplomatic activity abroad versus the potential of an attack. U.S. diplomats have generally described themselves as willing to accept this risk if properly mitigated and in the service of U.S. foreign policy objectives. They also worry that an excessive aversion to risk could undercut their effectiveness by keeping them cloistered and preventing the engagement that they see as the bedrock of their profession.

Whether a broad consensus exists on these sometimes competing imperatives remains open to question; for its part, the State Department’s own 2015 Quadrennial Diplomacy and Development Review suggested a need remains for a “broad dialogue on physical risk with the Executive and Legislative branches and beyond.”

The views expressed herein are those of the author and are not presented as those of CRS or the Library of Congress.

The Author is Alex Tiersky

Alex Tiersky provides analysis for Congress on foreign policy management and global issues as part of the Foreign Affairs, Defense, and Trade Division of the Congressional Research Service.  Prior to joining CRS, Tiersky served as Director of the Defense and Security Committee of the NATO Parliamentary Assembly, based in Brussels. He has also served as a Foreign Affairs Officer and Presidential Management Fellow at the U.S. Department of State. 

Learn more about The Cipher's Network here

Next Steps in U.S.-Cuba Relations
Strengthening U.S. Cyber Defenses
Russia Sanctions: The New Normal
Corruption in China: The Party’s Over
Change in the Kingdom: Three Big Shifts
Managing Information & Risk in the Digital Age
Endgame in Afghanistan
The Convergence of Crime and Terror
Strengthening the Public-Private Partnership
The Billion Dollar Spy: An Interview with Author David Hoffman
The New Battlefield
North Africa: Instability Increasing
The Kidnapping Capital of the World
Homegrown Terror in the Age of ISIS
The Refugee Crisis: Europe on the Brink
The Future of Mexican Oil
Cracks in the System
Embassy Security Three Years After Benghazi
Fourteen Years Later
Can Congress Solve the Cybersecurity Problem?
Arctic Game Changer?
Where They Stand on National Security
The First 100 Days
Worthy of Fleming: Anthony Horowitz's "Trigger Mortis"
At the Crossroads
Eye in the Sky
Rough Road Ahead for Rousseff
Leveling the Playing Field: Tech Access in China
The Dead Drop
Top of Mind for Chief Security Officers
Protecting Your Business
The Future of Oil
Chinese Expansion in Latin America
American Involvement in Syria
The Future of Geospatial Intelligence
The Umbrella Movement: One Year Later
Ebola: An End in Sight?
The Pakistan Problem
The Dead Drop
The Encryption Debate
Going Dark
The US-Mexico Relationship
The Rise of Mobile Technology in Africa
The Dead Drop
Construction Boom in the Gulf
Cybersecurity: The Human Factor
Beijing and the South China Sea
Will Peace Talks Succeed in Colombia?
Social Media and Terrorism
The Rise of Israel’s Tech Sector
Securing the Border
Red Sun Rising
The Dead Drop
Adopting the Iran Deal
Stability on the Peninsula
Crime in South Africa
Combatting Terrorist Financing
The Dead Drop
Recovering from a Cyber Attack
Stability in South Asia
Veterans Day
Israel’s Wave of Violence
The Dead Drop
Protecting Critical Infrastructure
ISIS on the March
The Paris Attacks
Rethinking U.S. Security Assistance
The War on Terror 2.0
Putting Mali in Context
Will Russia Ever Change?
Will Canada Pull Back?
Understanding Putin’s Popularity
Chinese Expansion in Africa
Terrorism Finance and Wildlife Poaching
Illicit Trafficking in Latin America
Climate Change and Security
Preventing Another San Bernardino
Supply Chain Security
Negotiating a New Safe Harbor Agreement
The Battle for Yemen
Foreign Tech Access in China
The Dead Drop
Offensive Cyber Operations
Travel Security in the Age of ISIS
Iran: A Rising Cyber Power?
The Future of Cybersecurity
The Arab Spring Five Years Later
Preparing Today’s Military for Tomorrow’s Wars
Cybersecurity for Small and Medium-Sized Enterprises
Maritime Security in the Gulf of Guinea
Improving Aviation Security
The Dead Drop
Terrorism in 2016
Cybersecurity in 2016
The World in 2016: Opportunities and Risks
China in 2016
Russia in 2016
Moscow’s Cyber Buildup
The China-India Relationship
Russian Influence in Latin America
The Future of Homegrown Terrorism
Stability in Sub-Saharan Africa
Protecting Your Digital Identity
Elections in Taiwan: A Turning Point?
The Caliphate of Crime
Biotechnology’s Dark Side
Rethinking U.S. Strategy Toward China
The Evolution of Weapons of Mass Destruction
A New Era in US-Iranian Relations?
Will Information Sharing Improve Cybersecurity?
Evaluating China's New Silk Road
Tech in Latin America: Opportunities and Challenges
The Destruction of Libyan Oil
Ransomware: Protecting Yourself from Cyber Extortion
The US and India: Strengthening Security Cooperation
Security and Stability in Afghanistan
Combatting the Al Shabaab Threat
Sports Security: Protecting Your Venue
Israel’s Arab Alliance: A Counter to ISIS and Iran?
The End of U.S. Space Supremacy
The Caucasus: Instability Increasing
Stabilizing Iraq
The Trans-Pacific Partnership: Deepening U.S. Commitment to Asia
Securing Industrial Control Systems
The Battle for Ukraine
Defeating Boko Haram
Jordan: The Indispensable Ally
China’s Military Modernization
The Cybersecurity Skills Shortage
Solving Mexico’s Violence Problem
The Northern Triangle: The Most Violent Region in the World
The Future of the Middle East
Terrorism in the World’s Largest Muslim Country
The Rise of Quantum Computing
Europe’s Terrorism Problem
Stability in the East China Sea
The Rise of Counter-Drone Technology
The ISIS WMD Threat
Healthcare and the Cyber Threat
Security in the Indo-Pacific: Australia’s New Role
Countering ISIS' Message
Containing the ISIS Cancer
Security, Privacy, and the Fight Over Encryption
Taking Aim at Smart Guns
Losing Patience with North Korea
The Difficult Road Ahead for Colombia
The Taliban Resurgence
ISIS: The New Face of Global Jihad?
Connecting with Latin America
Russia and China: Mutually Assured Detachment
The Scourge of Terrorism
The Security Challenge of Terror
European Unity in the Face of Crises
Developing Enhanced Cybersecurity Systems
Pakistan: Friend and Foe?
Egypt’s Economy on the Brink
Tehran’s Balancing Act
Russia Makes Moves in the Middle East
Kenya’s Battle with al-Shabaab
Missile Defense in the Korean Peninsula
Are America's Ports Secure?
The Human Factor Behind the Panama Papers Leak
Russian Military Modernization
APTs: The Boogeymen of Cybersecurity