CJ 682 7-2 Milestone Three Revised
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
682
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
12
Uploaded by CountOctopus1696
1
7-2 Final Project Milestone Three: Draft of Criticality/Impact and
Mitigation/Countermeasure Sections
Viktoria Prifti
CJ 682 Threat Assessment – 7-2 Milestone Three
Professor Henderson
11/06/2023
2
V. Consequence Assessment
Introduction
Hanscom Air Force Base is a critical asset for the Bedford community. Albeit operating
as a military installment, the facility is also responsible for managing the local airport, which
relives the regional Boston Logan International Airport. Nonetheless, it offers numerous job
opportunities to people within the area, thereby boosting Bedford's economic stature.
Considering its importance, a consequence analysis was conducted to determine the impact of an
attack on the human, economic, public confidence, and government capability aspects. The
analysis process used a worksheet that was informed by data regarding the asset, threat, and
vulnerability. Furthermore, the researcher complemented data from local government,
jurisdictional, and the U.S. Census Bureau resources with critical thinking to determine the level
of criticality.
Importance of the Asset
Human
The findings derived from the research and critical thinking revealed that the asset is
important to the Bedford community. From a human impact perspective, one can surmise that the
base has a workforce comprising 10,306 workers [ CITATION Han232 \l 1033 ]. The high
number of employees increases the risk of attacks, which contribute to at least 3,500 injuries and
150 deaths. Furthermore, at least 10% of the 1917 people living inside the base are exposed to
death and injuries emanating from an attack by the Taliban [ CITATION Dat23 \l 1033 ].
Similarly, the base is near the MIT Lincoln Library, which accentuates the risk of chemical
attacks. Hazardous materials can also be released into the area, with the probability of theft by
3
contractors increasing, which can lead to the facility's closure and subsequent disruption of
activities.
Economic
Second, Hanscom’s importance is elucidated by the economic impact of an attack. As a
key employer, the base contributes at least $6.4 billion to the national economy (Kalb, 2021).
Therefore, a terrorist attack on the facility will lead to numerous losses and disruptions,
especially in the aviation sector. Likewise, an attack might undermine the facility's operations,
with equipment worth $1.2 billion being damaged. This can contribute to below-par performance
in the military aspect, as the base is responsible for sharing information through the C3I&N
system.
Public Confidence
Furthermore, Hansom Air Force Base enjoys a long-standing relationship with the public.
The latter rely on it for security and employment, with its location minimizing the probability of
incursions. Au contraire, it is likely to report a damaged brand image and reputation if the
Taliban launches an attack against it. The community and general public will perceive it as a
viable target and threat. Therefore, public sentiment will shift against the Air Force base, thus
undermining its relationship with the locals.
Government Capability
Finally, the facility is reverred and important due to its C3I&N system, which enhances
government capabilities. The system is responsible for collecting and doling out intelligence
information vital for domestic and international security. The occurrence of an attack on the asset
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
can contribute to breaches and decreased efficiency. Other than the C3I&N system, Hanscom
oversees the maintenance of transportation activities at Boston Logan International. Any
disruptive activities will lead to the diversion of planes and loss of revenue [ CITATION
USD202 \l 1033 ]. The local government relies on the base for support with its ill-equipped
nature, creating concerns about security management.
The local elected officials in the
communities around the base include the mayor and house representatives. The officials provide
manpower and financial resources that can help manage an attack.
Likely Attack Scenario
The likely attack scenario will involve a host of factors, with the topmost being a
cybersecurity and insider attack. The former entails the Taliban launching a ransomware which
will cripple the C3I&N system. Thereafter, they will lock down communication between the base
and other law enforcement agencies. Any recruits within the facility will engage in espionage,
where they collect, edit, or delete critical information pertaining to its operations. The collected
data will then be sold to national enemies, including Russia, with the terrorist cell also holding
some of it for future attacks. Without communication, Hanscom will face the threat of a physical
attack, with the insurgents making their way into the facilities. They will use guns to maim or kill
the employees, thus leading to closure and disruptions.
A.
Level of Damage
Suffice it to say that the level of damage will be high. First, the base will lose its
operational efficiency due to a cybersecurity attack. It will be forced to close down its systems in
order to protect confidential data, as shown in the case of JBS Foods. Likewise, the insider threat
will contribute to a decline in public confidence and government capability. The community will
5
become wary of the base's operations, thus undermining its reputation and brand image.
Furthermore, the physical attack will contribute to the deaths of 150 people while another 3,500
are injured. While high, the numbers are similar to the ones reported in the recent Capitol
incursion, where at least 140 people were injured.
B.
Severity of Adverse Effects
The severity calculations reveal that the level of consequence is moderate considering the
impact on the government's capabilities, public confidence, and human and economic aspects.
These calculations were derived using a formula that multiplies the consequence by vulnerability
and threat. A score of 288 was derived from the formula as shown below:
T=6
V=6
C=8
=6*6*8
=288
V.
Countermeasures
Hanscom's leadership must implement countermeasures to mitigate the terrorist threat. It is
critical that the leadership use contemporary technology in order to increase the base's security
posture across three key areas including physical, cyber, and personnel security.
A.
Recommend Countermeasures
i.
Physical Security
6
Hanscom Air Force Base will also resort to low-tech elements, including deployable
barriers that rise into position during an attack. The barriers can be rapidly set up on asphalt or
concrete roads to manage the flow of cars or individuals. Specifically, the base will use Delta's
portable barriers to secure its key facilities[ CITATION Del231 \l 1033 ]. The permanent steel
bollards will be installed at the gate where the necessary checks are conducted. The MP5000 and
DSC1000 barriers from Delta will be purchased and placed across the base.
Likewise, the base will mitigate the physical security vulnerabilities through mechanical
and electrical turnstiles. The turnstiles are part of the control system, which will detect and deter
unauthorized entries. The base will ensure that each door has a card or biometric reader that
offers access only to authorized parties [ CITATION Bri18 \l 1033 ]. Specifically, it will utilize
the latest technology, like optical turnstiles that rely on electronic beams and visual interfaces
when managing entry.
Figure 1: Turnstines
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
Source: AIS Technology (2023)
ii.
Cybersecurity
Hanscom Air Force Base relies on the
PEO C3I&N, which is susceptible to various
threats that can impact operational efficiency. In order to protect this critical infrastructure, the
organization must implement access control systems. These systems are automated and manage
access to the controlled area or system. Specifically, the top brass will implement the Mandatory
Access Control, wherein the leaders have control over settings[ CITATION Bar231 \l 1033 ]. The
administrators will determine which parties have privileges while evaluating the nature of their
operations in the system. The MAC model will be complemented by Role-Based Access Control,
which assigns permissions to key members in the air base. The network access will be limited
based on the individual roles and responsibilities within the firm. The government facility can
use SecureLink, which is the latest product in the industry that controls devices and user access
to the C3I&N.
iii.
Personnel Security
The best-fit countermeasure is security patrols, considering the base's sensitive nature.
The management will create a staffing plan to ensure continuous patrols during the day and
night[ CITATION Uni12 \l 1033 ]. The latest trends in patrols involve using dogs that help detect
any intrusion or explosive residues.
Subsequently, a security awareness program will be used to apprise the staff of
Hanscom’s vulnerabilities. The program will be conducted using the latest technologies, like
video calls, to address the individual and geographical needs of staff members. It will play a key
role in distributing responsibility and enhancing concerted efforts towards securing the base.
8
B.
Deter Terrorist Threats
The deployable barriers and turnstiles will force the actors to rethink attacking the base.
The two work together to manage inflow and outflow, thus prompting alternative measures. They
will deter potential threats by minimizing access to the physical facilities.
Also, the organization
will utilize Natural Surveillance CIPD strategies to keep intruders under observation. This
strategy relies on design features that enhance the key facility’s visibility
[ CITATION Cit17 \l
1033 ]
. The security personnel will be able to observe users and intruders while challenging
inappropriate behavior and reporting it to law enforcement. The technique will deter the behavior
of Taliban insurgents and insiders by increasing awareness that they are being watched.
Figure 2: Deployable Barriers
Source: [ CITATION Del231 \l 1033 ]
The natural surveillance also includes setting up physical features and activities that
maximize visibility in a bid to decrease target opportunities. For instance, the base will ensure
9
adequate illuminatin of public areas through the use of automated rifle series street lights. These
lights are the net generation which utilize high-efficiency LED Lamp Beads combined with
artificial intelligence. The doors and windows will be designed to look into the parking lot and
other public areas while reducing any obstructions preventing visibility. An example is shown in
figure 2 below:
Figure 3: Rifle Street lights
Source: ZGSM-China (2023)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
10
Likewise, the MAC and RABC control will minimize insider threats and ransomware.
They will regulate access to information based on personnel privileges. This will deter any
potential threat emanating from espionage.
Figure 4: Role-Based Access Control
Source: Hoffman (2023)
The final countermeasure involves security patrols and awareness programs. The two are
vital in deterring attacks by ensuring that the personnel actively monitor the facility and its
environs. The awareness program will enhance awareness of Hanscom's vulnerability, thus
tasking personnel with securing the critical assets. This plays a major role in minimizing insider
threats.
Figure 5: Security Patrols
11
Source: [ CITATION Oli20 \l 1033 ]
References
AIS Technology. (2023). Gates and Turnstiles.
https://aistechnology.mt/gates-and-turnstiles/
U.S. Department of State Bureau of Counterterrorism. (2020).
Annex of Statistical Information
Country Reports on Terrorism 2019.
Development Services Group, Inc.
Bennett, B. (2018).
Understanding, Assessing, and Responding to Terrorism: Protecting Critical
Infrastructure and Personnel.
Wiley.
City of Virginia Beach. (2017).
Crime Prevention Through Environmental Design.
City of
Virginia Beach.
Data USA. (2023).
HANSCOM AFB, MA
. Retrieved from Data USA:
https://datausa.io/profile/geo/hanscom-afb-ma#:~:text=Hanscom%20AFB%2C%20MA
%20is%20home,any%20other%20race%20or%20ethnicity.
Delta Scientific Corporation. (2023).
Portable Barriers
. Retrieved from Delta Scientific
Corporation: https://deltascientific.com/high-security/portable-barriers/
Grooms, O. (2020, July 16).
Military Working Dogs handlers stick together
. Retrieved from
AFCENT: https://www.afcent.af.mil/Units/379th-Air-Expeditionary-
Wing/News/Display/Article/2276360/military-working-dogs-handlers-stick-together/
12
Hanscom Air Force Base. (2023).
About Us
. Retrieved from Hanscom:
https://www.hanscom.af.mil/
Hoffman, B. (2023).
Access Control: Models and Methods
. Retrieved from Delinea:
https://delinea.com/blog/access-control-models-methods#:~:text=There%20are%20four
%20types%20of,RBAC%20or%20RB%2DRBAC).
Kalb, G. (2021). Bedford Explained. Retrieved from The Bedford Citizen:
https://thebedfordcitizen.org/2021/06/bedford-explained-hanscom
United States. Department of Homeland Security. (2012).
Buildings and Infrastructure
Protection Series: Primer to Design Safe School Projects in Case of Terrorist Attacks and
School Shootings.
ZGSM-China (2023). Different types of street lights and their applications. https://www.zgsm-
china.com/blog/different-types-of-street-lights-and-their-applications.html#:~:text=The
%20rifle%20series%20street%20light,control%20systems%20in%20the%20future.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help