CJ 682 Milestone One
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
682
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
9
Uploaded by CountOctopus1696
1
3-2 Final Project Milestone One: Draft of Introduction and Threat
Identification Sections
Viktoria Prifti
CJ 682 : Threat Assessment
Professor Henderson
10/08/2023
2
I.
Asset Identification
The Hanscom Air Force Base was built in 1941 as a military installation and airport. The
base is located in the town of Bedford in Massachusetts. Its sensitivity led to the government
classifying it under the transportation systems sector[ CITATION Han232 \l 1033 ]. This
classification was seminal, considering its role in serving the nation by providing military
services that enhance domestic security. It also operates the adjacent airport that serves civil
airlines.
The Department of Transportation and Homeland Security manage the asset’s operations.
The researcher chose it due to its significance in both military and civil aspects of American
society. The asset is responsible for acquiring vital warfighting systems for the Air Force and
other military branches.
Likewise, it sets up the systems to ensure continuous connection and
communication between warfighters. At least 99% of the air traffic within the base is non-
military[ CITATION Han232 \l 1033 ]. It works with the Massachusetts Port Authority to
manage the adjacent civil airport. The airport serves as a corporate reliever for the Boston Logan
International Airport. Therefore, the air force base is a viable target for any attacks launched by
state enemies. Any disruptions in its operations can lead to deleterious effects for both the
military and civilians around the region. Figure 1 below offers a pictorial description of the
critical infrastructure.
A brief overview of the TSS sector reveals that it provides transportation of goods
between government facilities. It also allows for the movement of people during regular
operations and after disasters[ CITATION Hom15 \l 1033 ]. The overarching vision of the sector
3
is to create a secure and resilient system. This system will enable legitimate goods and travelers
to move without disrupting the economy or exhibiting any fear of harm.
Figure 1: Hanscom Air Force Base
Subsequently, its mission is to enhance the nation’s security and resilience posture. This
enhancement is vital in ensuring the safety and security of denizens and goods[ CITATION
Hom15 \l 1033 ]. It also aims to attain key goals such as reducing risk and improving confidence
in the system
The sector-specific risks related to TSS include terrorist attacks, aging infrastructure,
cybersecurity, and criminal threats. These risks undermine the sector assets that are in the
interests of national security. Therefore, the DHS and DOT have collaborated with infrastructure
owners and operators to improve its security and resilience against potential or implied harm.
II.
Threat Identification
The researcher conducted a brief research on the internet to identify specific threats
affecting the transportation sector. The research process involved using the Global Terrorism
Database, whereby the terrorist groups, weapon/attack types, and targets were identified.
Likewise, the researcher conducted a Google search on historical attacks to pinpoint the threat
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
level. Annual crime reports were derived from local law enforcement with the Department of
State: Annex of Statistical Information offering further insight into victims, weapons, and tactics.
The final step involved conducting a web search to identify any cyber-attacks against the
asset/sector while uncovering valid data from social media platforms.
a.
Critical Infrastructure Sector
The Global Terrorism Database highlights that there were 5128 incidents against
government targets between 2015 and 2019. Out of the tally, bombings and explosions ranked
the highest[ CITATION Glo23 \l 1033 ]. Furthermore, there were limited reports of armed
assaults, although the number of assassinations remained high. Likewise, the groups hijacked
and took hostages in order to spark fear.
Figure 3: Attack Type
Source: [ CITATION Glo23 \l 1033 ]
5
The most common weapons used by the cells included firearms, which accounted for
2636 incidents[ CITATION Glo23 \l 1033 ]. They were closely followed by explosives and
unknown weapons. Furthermore, incendiaries were far too common among small groups.
Figure 4: Weapons
Source: [ CITATION Glo23 \l 1033 ]
b.
Key Asset
The key asset has also faced past terrorist threats. In 1962, a modified former tanker
crashed as it approached the runway, leading to the aircraft's damage and the deaths of the flight
crew. Fast forward to 2017, the Air Force base was closed down after military personnel found
explosive residue on a moving truck within its vicinity[ CITATION CBS17 \l 1033 ]. The
authorities were alerted with evacuation efforts being conducted to safeguard the asset. The
authorities then assessed two suspicious vehicles, with the items found in them testing positive
for residue. Therefore, it was classified as a high-risk area, with the DHS and DOT calling on
strict safety standards/measures.
6
c.
Terrorist Groups
The Air Force base faces a threat from both domestic and international terrorist groups.
Specifically, Antifa undermines the asset's operations, considering its position as a military
facility. The group is known for rioting and looting, which can ultimately lead to disruptions.
Another potential threat is the Taliban, which has grown since 1994[ CITATION USD202 \l 1033
]. The group has affiliate links with other cells like Al-Qaeda and Isis. Its resourcefulness,
therefore, means that it can launch an attack on the Air Force base using radicalized masses
within the borders.
d.
Motivation, Capabilities, and Tactics
In most instances, the terrorist groups are motivated by political and ideological reasons [
CITATION Dep151 \l 1033 ]. The cells view it as a sign of an illegitimate regime and can plan to
attack it in order to send a message[ CITATION Dep151 \l 1033 ]. The current security posture is
weak, with terrorists moving around undetected. Finally, the cells have resorted to primary
tactics such as shooting and bombing. Current statistics reveal that the former accounts for 41%
of attacks compared to the latter at 13% [CITATION USD202 \l 1033 ]. The recent bomb scare at
the base is a sign that the groups are willing to do what it takes to disrupt its operations.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
Figure 3: Primary Tactics
Source: [CITATION USD202 \l 1033 ]
e.
Threat Level
The threat analysis reveals a high likelihood of a terrorist attack occurring on the Air
Force base. Both groups have the resources and intentions to threaten the asset. Furthermore, the
rating reveals that they have WMD capacities such as explosives. The groups' history reveals that
they justify their attacks based on religious and political ideologies. Therefore, it is important for
the government to act and secure the asset.
8
References
U.S. Department of State Bureau of Counterterrorism. (2020).
Annex of Statistical Information
Country Reports on Terrorism 2019.
Development Services Group, Inc.
CBS News. (2017, July 5).
U.S. Explosive material scare triggers evacuations at Hanscom Air
Force base
. Retrieved from CBS News: https://www.cbsnews.com/news/hanscom-air-
force-base-bomb-squad-massachusetts/
Department of Homeland Security. (2015).
Attacks on Federal Government: 2001-2013.
Global Terrorism Database. (2023).
SEARCH RESULTS: 5128 INCIDENTS
. Retrieved from
UMD: https://www.start.umd.edu/gtd/search/Results.aspx?
chart=weapon&casualties_type=b&casualties_max=&start_yearonly=2015&end_yearonl
y=2019&dtp2=all&attack=2,1,3,7,4,5,6,8,9&target=2
Hanscom Air Force Base. (2023).
About Us
. Retrieved from Hanscom:
https://www.hanscom.af.mil/
Homeland Security. (2015).
Government Facilities Sector-Specific Plan.
https://www.cisa.gov/sites/default/files/2023-03/nipp-ssp-government-facilities-2015-
508.pdf.
9
THREAT FACTORS
Threat
Level
(1–10)
Motivation
P = Political
R = Religious
E = Environmental
Ra = Racial
S = Special Interest
(Choose one or more)
WMD Categories
C = Chemical
B = Biological
R = Radiological
N = Nuclear
E = Explosive
(Choose one or more)
PTE
Existence
(1)
Violent History
(1)
Intentions
(2)
WMD Capability
(2)
Targeting
(4)
Antifa
1
1
2
0
4
8
P
E
Taliban
1
1
2
2
4
19
P, R
E
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help