CJ 682 Milestone One

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

682

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

9

Uploaded by CountOctopus1696

Report
1 3-2 Final Project Milestone One: Draft of Introduction and Threat Identification Sections Viktoria Prifti CJ 682 : Threat Assessment Professor Henderson 10/08/2023
2 I. Asset Identification The Hanscom Air Force Base was built in 1941 as a military installation and airport. The base is located in the town of Bedford in Massachusetts. Its sensitivity led to the government classifying it under the transportation systems sector[ CITATION Han232 \l 1033 ]. This classification was seminal, considering its role in serving the nation by providing military services that enhance domestic security. It also operates the adjacent airport that serves civil airlines. The Department of Transportation and Homeland Security manage the asset’s operations. The researcher chose it due to its significance in both military and civil aspects of American society. The asset is responsible for acquiring vital warfighting systems for the Air Force and other military branches. Likewise, it sets up the systems to ensure continuous connection and communication between warfighters. At least 99% of the air traffic within the base is non- military[ CITATION Han232 \l 1033 ]. It works with the Massachusetts Port Authority to manage the adjacent civil airport. The airport serves as a corporate reliever for the Boston Logan International Airport. Therefore, the air force base is a viable target for any attacks launched by state enemies. Any disruptions in its operations can lead to deleterious effects for both the military and civilians around the region. Figure 1 below offers a pictorial description of the critical infrastructure. A brief overview of the TSS sector reveals that it provides transportation of goods between government facilities. It also allows for the movement of people during regular operations and after disasters[ CITATION Hom15 \l 1033 ]. The overarching vision of the sector
3 is to create a secure and resilient system. This system will enable legitimate goods and travelers to move without disrupting the economy or exhibiting any fear of harm. Figure 1: Hanscom Air Force Base Subsequently, its mission is to enhance the nation’s security and resilience posture. This enhancement is vital in ensuring the safety and security of denizens and goods[ CITATION Hom15 \l 1033 ]. It also aims to attain key goals such as reducing risk and improving confidence in the system The sector-specific risks related to TSS include terrorist attacks, aging infrastructure, cybersecurity, and criminal threats. These risks undermine the sector assets that are in the interests of national security. Therefore, the DHS and DOT have collaborated with infrastructure owners and operators to improve its security and resilience against potential or implied harm. II. Threat Identification The researcher conducted a brief research on the internet to identify specific threats affecting the transportation sector. The research process involved using the Global Terrorism Database, whereby the terrorist groups, weapon/attack types, and targets were identified. Likewise, the researcher conducted a Google search on historical attacks to pinpoint the threat
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 level. Annual crime reports were derived from local law enforcement with the Department of State: Annex of Statistical Information offering further insight into victims, weapons, and tactics. The final step involved conducting a web search to identify any cyber-attacks against the asset/sector while uncovering valid data from social media platforms. a. Critical Infrastructure Sector The Global Terrorism Database highlights that there were 5128 incidents against government targets between 2015 and 2019. Out of the tally, bombings and explosions ranked the highest[ CITATION Glo23 \l 1033 ]. Furthermore, there were limited reports of armed assaults, although the number of assassinations remained high. Likewise, the groups hijacked and took hostages in order to spark fear. Figure 3: Attack Type Source: [ CITATION Glo23 \l 1033 ]
5 The most common weapons used by the cells included firearms, which accounted for 2636 incidents[ CITATION Glo23 \l 1033 ]. They were closely followed by explosives and unknown weapons. Furthermore, incendiaries were far too common among small groups. Figure 4: Weapons Source: [ CITATION Glo23 \l 1033 ] b. Key Asset The key asset has also faced past terrorist threats. In 1962, a modified former tanker crashed as it approached the runway, leading to the aircraft's damage and the deaths of the flight crew. Fast forward to 2017, the Air Force base was closed down after military personnel found explosive residue on a moving truck within its vicinity[ CITATION CBS17 \l 1033 ]. The authorities were alerted with evacuation efforts being conducted to safeguard the asset. The authorities then assessed two suspicious vehicles, with the items found in them testing positive for residue. Therefore, it was classified as a high-risk area, with the DHS and DOT calling on strict safety standards/measures.
6 c. Terrorist Groups The Air Force base faces a threat from both domestic and international terrorist groups. Specifically, Antifa undermines the asset's operations, considering its position as a military facility. The group is known for rioting and looting, which can ultimately lead to disruptions. Another potential threat is the Taliban, which has grown since 1994[ CITATION USD202 \l 1033 ]. The group has affiliate links with other cells like Al-Qaeda and Isis. Its resourcefulness, therefore, means that it can launch an attack on the Air Force base using radicalized masses within the borders. d. Motivation, Capabilities, and Tactics In most instances, the terrorist groups are motivated by political and ideological reasons [ CITATION Dep151 \l 1033 ]. The cells view it as a sign of an illegitimate regime and can plan to attack it in order to send a message[ CITATION Dep151 \l 1033 ]. The current security posture is weak, with terrorists moving around undetected. Finally, the cells have resorted to primary tactics such as shooting and bombing. Current statistics reveal that the former accounts for 41% of attacks compared to the latter at 13% [CITATION USD202 \l 1033 ]. The recent bomb scare at the base is a sign that the groups are willing to do what it takes to disrupt its operations.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 Figure 3: Primary Tactics Source: [CITATION USD202 \l 1033 ] e. Threat Level The threat analysis reveals a high likelihood of a terrorist attack occurring on the Air Force base. Both groups have the resources and intentions to threaten the asset. Furthermore, the rating reveals that they have WMD capacities such as explosives. The groups' history reveals that they justify their attacks based on religious and political ideologies. Therefore, it is important for the government to act and secure the asset.
8 References U.S. Department of State Bureau of Counterterrorism. (2020). Annex of Statistical Information Country Reports on Terrorism 2019. Development Services Group, Inc. CBS News. (2017, July 5). U.S. Explosive material scare triggers evacuations at Hanscom Air Force base . Retrieved from CBS News: https://www.cbsnews.com/news/hanscom-air- force-base-bomb-squad-massachusetts/ Department of Homeland Security. (2015). Attacks on Federal Government: 2001-2013. Global Terrorism Database. (2023). SEARCH RESULTS: 5128 INCIDENTS . Retrieved from UMD: https://www.start.umd.edu/gtd/search/Results.aspx? chart=weapon&casualties_type=b&casualties_max=&start_yearonly=2015&end_yearonl y=2019&dtp2=all&attack=2,1,3,7,4,5,6,8,9&target=2 Hanscom Air Force Base. (2023). About Us . Retrieved from Hanscom: https://www.hanscom.af.mil/ Homeland Security. (2015). Government Facilities Sector-Specific Plan. https://www.cisa.gov/sites/default/files/2023-03/nipp-ssp-government-facilities-2015- 508.pdf.
9 THREAT FACTORS Threat Level (1–10) Motivation P = Political R = Religious E = Environmental Ra = Racial S = Special Interest (Choose one or more) WMD Categories C = Chemical B = Biological R = Radiological N = Nuclear E = Explosive (Choose one or more) PTE Existence (1) Violent History (1) Intentions (2) WMD Capability (2) Targeting (4) Antifa 1 1 2 0 4 8 P E Taliban 1 1 2 2 4 19 P, R E
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help