CJ 682 Final Project Revised 9-2
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
682
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
38
Uploaded by CountOctopus1696
1
CJ 682 Final Project
Viktoria Prifti
CJ 682 Threat Assessment – 9-2 Final Project Milestone
Professor Henderson
11/20/2023
2
Abstract
This paper presents an overview into Hanscom Air Force Base in Massachusetts. The asset is
identified in tande wth the potential targets, probable and actual vulnerabilities. The necessary
consequence assessment was conducted to determine the asset’s importance in the community.
Nonetheless, the paper predicted the levels of damages while recommending partnerships that
can assuage the effects. The insight derived from this report will be useful in enhancing the air
force base’s security posture and mitigating the likelihood of future threats.
Keywords: threat, vulnerability, air force base, leadership, consequence.
3
Table of Contents
I.
Asset Identification:
.............................................................................................................................
4
II.
Threat Identification
............................................................................................................................
6
III.
Vulnerability Identification
............................................................................................................
10
IV.
Vulnerability Assessment
...............................................................................................................
17
V.
Consequence Assessment:
.................................................................................................................
19
VI.
Countermeasures:
..........................................................................................................................
22
References
.................................................................................................................................................
31
Appendix A
...............................................................................................................................................
35
Jurisdictional Threat Rating Worksheet
.................................................................................................
35
Threat Factor Definitions
...................................................................................................................
35
Appendix B
...............................................................................................................................................
36
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
I.
Asset Identification:
Location: 1617, Old Bedford Rd, Hanscom AFB, MA 01731
Crifical Infrastructure Sector: Transportation sector
Responsible Federal Agency: DHS and DTS
The Hanscom Air Force Base was built in 1941 as a military installation and airport. The
base is located in the town of Bedford in Massachusetts. Its sensitivity led to the government
classifying it under the transportation systems sector[ CITATION Han232 \l 1033 ]. This
classification was seminal, considering its role in serving the nation by providing military
services that enhance domestic security. It also operates the adjacent airport that serves civil
airlines. The Department of Transportation and Homeland Security manage the asset’s operations.
The researcher chose it due to its significance in both military and civil aspects of American
society. The asset is responsible for acquiring vital warfighting systems for the Air Force and
other military branches. Likewise, it sets up the systems to ensure continuous connection and
communication between warfighters. At least 99% of the air traffic within the base is non-
military[ CITATION Han232 \l 1033 ]. It works with the Massachusetts Port Authority to
manage the adjacent civil airport. The airport serves as a corporate reliever for the Boston Logan
International Airport. Therefore, the air force base is a viable target for any attacks launched by
state enemies. Any disruptions in its operations can lead to deleterious effects for both the
military and civilians around the region. Figure 1 below offers a pictorial description of the
critical infrastructure.
5
A brief overview of the TSS sector reveals that it provides transportation of goods
between government facilities. It also allows for the movement of people during regular
operations and after disasters[ CITATION Hom15 \l 1033 ]. The overarching vision of the sector
is to create a secure and resilient system. This system will enable legitimate goods and travelers
to move without disrupting the economy or exhibiting any fear of harm.
Figure 1: Hanscom Air Force Base
Subsequently, its mission is to enhance the nation’s security and resilience posture. This
enhancement is vital in ensuring the safety and security of denizens and goods[ CITATION
Hom15 \l 1033 ]. It also aims to attain key goals such as reducing risk and improving confidence
in the system The sector-specific risks related to TSS include terrorist attacks, aging infrastructure,
cybersecurity, and criminal threats. These risks undermine the sector assets that are in the
6
interests of national security. Therefore, the DHS and DOT have collaborated with infrastructure
owners and operators to improve its security and resilience against potential or implied harm. II.
Threat Identification
This investigator used the following data collection methods to obtain threat research. The results
from each search will be shared within the corresponding sections. a.
Used the Global Terrorism Database to interpret threat data related to the sector
,
which include terrorist groups, weapon types, attack types, and target types.
b.
Conducted a Google search for historical attacks or significant crimes against the sector and
critical infrastructure/key resource (CI/KR).
c.
Conducted a Google search of annual crime reports related to your target.
d.
Conducted a Google search for pertinent domestic terrorist threats against the sector and critical infrastructure/key resource. e.
Interpreted and included related graphs from the Department of State: Annex of Statistical Information (2019) related to perpetrators, targets, tactics, and weapons.
f.
Conducted a cybersecurity database search to identify potential cyberattacks against the sector and asset.
g.
Utilized additional data collection resources such as social media.
h.
Critical Infrastructure Sector
Historical Context
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
The Global Terrorism Database highlights that there were 5128 incidents against
government targets between 2015 and 2019. Out of the tally, bombings and explosions ranked
the highest[ CITATION Glo23 \l 1033 ]. Furthermore, there were limited reports of armed
assaults, although the number of assassinations remained high. Likewise, the groups hijacked
and took hostages in order to spark fear. Figure 2: Attack Type
Source: [ CITATION Glo23 \l 1033 ]
The most common weapons used by the cells included firearms, which accounted for
2636 incidents[ CITATION Glo23 \l 1033 ]. They were closely followed by explosives and
unknown weapons. Furthermore, incendiaries were far too common among small groups.
8
Figure 3: Weapons
Source: [ CITATION Glo23 \l 1033 ]
Key Asset
The key asset has also faced past terrorist threats. In 1962, a modified former tanker
crashed as it approached the runway, leading to the aircraft's damage and the deaths of the flight
crew. Fast forward to 2017, the Air Force base was closed down after military personnel found
explosive residue on a moving truck within its vicinity[ CITATION CBS17 \l 1033 ]. The
authorities were alerted with evacuation efforts being conducted to safeguard the asset. The
authorities then assessed two suspicious vehicles, with the items found in them testing positive
for residue. Therefore, it was classified as a high-risk area, with the DHS and DOT calling on
strict safety standards/measures. Nonetheless, the local police annual crime report highlights that
the area has been safe and devoid of any cases of insecurity. This is confirmed by the presence of
a military installation in the region.
9
Terrorist Groups
The Air Force base faces a threat from both domestic and international terrorist groups.
The specific threat is posed by the Taliban, which has grown since 1994[ CITATION USD202 \l
1033 ]. The group has affiliate links and a massive following. Its resourcefulness, therefore,
means that it can launch an attack on the Air Force base using radicalized masses within the
borders. Motivation, Capabilities, and Tactics
In most instances, the terrorist groups are motivated by political and ideological reasons [
CITATION Dep151 \l 1033 ]. The cells view it as a sign of an illegitimate regime and can plan to
attack it in order to send a message[ CITATION Dep151 \l 1033 ]. The current security posture is
weak, with terrorists moving around undetected. Finally, the cells have resorted to primary
tactics such as shooting and bombing. Current statistics reveal that the former accounts for 41%
of attacks compared to the latter at 13% as shown in the figure below [CITATION USD202 \l
1033 ]. The recent bomb scare at the base is a sign that the groups are willing to do what it takes
to disrupt its operations. The shooting method is preferred due to the availability of weapons and
goveremnt flexibility regarding gun ownership.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
10
Figure 4: Primary Tactics
Source: [CITATION USD202 \l 1033 ]
Threat Level
The threat analysis reveals a high likelihood of a terrorist attack occurring on the Air
Force base. Both groups have the resources and intentions to threaten the asset. Furthermore, the
rating reveals that they have WMD capacities such as explosives. The groups' history reveals that
they justify their attacks based on religious and political ideologies. Therefore, it is important for
the government to act and secure the asset.
III.
Vulnerability Identification
Hanscom Air Force Base is guided by the mission of “providing worldwide support for the Air
Force Life Cycle Management Center and outstanding quality-of-life opportunities for our
11
military personnel, their family members, and the many workers who are part of Team
Hanscom” [ CITATION Han232 \l 1033 ]. Overview of Property
Hanscom Air Force Base is located in the state of Massachusetts. The infrastructure is set
up on a land spanning 846 acres which contains at least 155 buildings. The topmost building is
the medical clinic, which serves the needs of the residents [ CITATION Han232 \l 1033 ].
Likewise, it houses auto skills, force aid, barber shop-exchange, base-exchange, and churches.
Most of the buildings in the area are 731 privatized family housing for current or former military
officers [ CITATION Han232 \l 1033 ]. Also, the base is home to numerous civilians from
divergent backgrounds. It has a surrounding perimeter wall, which is bordered by residential
properties.
Figure 5: Base Map
Source: [ CITATION Han232 \l 1033 ]
12
Figure 6: Critical asset
Source: [ CITATION Han232 \l 1033 ]
Operating Elements
The administrative operating element is managed by the Department of Transportation
and Homeland Security. The two agencies work together with the base commander to set up a
robust administrative structure that ensures operational efficiency [ CITATION Han232 \l 1033 ].
The base commander also liaises and collaborates with the Massachusetts Port Authority to
control the flow of civil airlines in the adjacent airport. The current base commander is Colonel
Taona Enriquez, who works with Major General Antony Genatempo to uphold security and
continued operations [ CITATION Han232 \l 1033 ].
The second functional element is the PEO C3I&N, which consists of command, control,
communications, and intelligence and networking systems. The system was set up at the base to
collect information that is shared with combatant commanders [ CITATION Han232 \l 1033 ].
The C3I&N is also responsible for coalition and joint cyberspace, as well as developing
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
13
cryptologic algorithms that safeguard military data. It connects various systems across the force
with the intention of sustaining war-winning capabilities.
People
The administrative element contains 5 leaders/executives, as shown in the figure below. Major
General Anthony Genatempo is the executive officer for the C3I&N and is flanked by Scott C.
Hardiman. The latter is the civilian director responsible for the NC3 and program execution.
Likewise, Steven Wert is the program executive officer (PEO) for the base's life cycle
management center. The base commander (Taona) works together with Chief Master Sergeant
Alan Weary to manage the facility’s operations.
Figure 7: Leadership
Source: [ CITATION Han232 \l 1033 ]
The C3I&N has a total workforce of 10,306 employees. Out of the total, at least 899 are
active duty service men, with 400 working under the National Guard [ CITATION Han232 \l
1033 ]. Likewise, the LCMC and DOD civilians account for 1,743 and 555 employees compared
to non-DOD and non-appropriated fund civilians at 92 and 170, respectively [ CITATION
Han232 \l 1033 ]. There are 2,208 contractors, with the MIT Lincoln lab having 4058 employees.
14
Valuable and Critical Assets
The topmost valuable and critical asset at the facility is its cyber systems. These systems
(C3I&N) are responsible for the collection of intelligence information, which is shared with
combatant commanders to ensure decision-making. Subsequently, the Boston Logan
International Airport is critical to its operations with regard to the movement of goods and
people. Proprietary Information
The cyber technology systems contain proprietary files and data that can be targeted by
terrorists. Specifically, the C3I&N is used to collect intelligence information and protect the
nation's network infrastructure. It contains data regarding missions and America's security
posture, which can be detrimental if accessed by the wrong parties. Likewise, the adjacent
civilian airport has computer systems with personally identifiable information. Terrorists might
gain access to the systems and use the information for identity theft purposes in order to gain
entry into Hanscom Air Force base. Reputation
Hanscom Air Force Base has a positive reputation in the area due to its operations and
security mechanisms. The C3I&N has, however, come under intense scrutiny as it collects
pertinent information about domestic and international operations. The data collection process is
often conducted without consent, which might violate citizen privacy. Nonetheless, the loss of
information can contribute to attacks and damaged organizational reputation. Protection Justification
15
Both the C3I&N and Air Force base must be protected because of their two-pronged role
in warfighting and transportation. For instance, any disruptions to the former can contribute to
lost connection and communication between servicemen. The occurrence of an attack on the
latter will ultimately lead to disrupted transportation. Common vulnerabilities
Hanscom Air Force base is faced with three different vulnerabilities which affect its
operational efficiency. The first vulnerability pertains to cybersecurity, with the facility lacking
the necessary software and measures to counteract attacks. The specific information used to
identify this vulnerability was collected from the DHS's Sector Specific Plan (Homeland
Security, 2015). The plan denotes that government facilities like the base have witnessed a surge
in reported malware or ransomware attacks. Even though Hansom has a robust cybersecurity
system, it still faces the likelihood of an attack, considering the fast-paced nature of technology.
The specific location that could be attacked is its communication systems. This scenario can
include hackers gaining access to communications and barring user privileges (Arctic Wolf,
2022). They will likely use a ransomware method to exploit the vulnerability, as shown in the
case of JBS Foods. The actor will access this vulnerability through weak firewalls and open
ports.
Subsequently, the critical infrastructure has a physical security vulnerability. This is
confirmed by the recent Capitol Attacks, which saw people accessing government facilities
without authorization (Byman, 2021). The base's operations offices will be attacked, thereby
undermining the movement of people in the airport. Furthermore, the likely potential attack
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
16
scenario will involve individuals using weapons like guns. The threat actors will access this
vulnerability through weak access control policies or systems. The final vulnerability pertains to insider threats often launched by contractors or
employees. I identified this information based on the Snowden scandal, whereby a worker leaked
sensitive information about a federal government facility (Satter, 2020). The specific location
that will be attacked is the facility's system. The employee or contractor can access this
vulnerability using their privileges. They will then maneuver through the systems by editing,
downloading, or deleting some of the information. The probable method of attack will involve
espionage, with the information being sold to the highest bidder, as shown by Edward Snowden.
Figure 8: U.S. Capitol Attack
Source: [ CITATION Was21 \l 1033 ]
Probable Vulnerabilities
17
At Hanscom Air Force Base, the common vulnerabilities include cybersecurity, with
attackers gaining access through the communication systems. The attacks will be launched on the
C3I&N, thereby leading to communication and data maintenance issues. Subsequently, the CI
faces the risk of physical security breaches, with attackers gaining access to the airport and key
buildings. They will likely use guns and capitalize on vulnerabilities such as weak access control
policies at the gate. The final vulnerability is insider threats, with an employee or contractor
using their privileges to access the system. They will then move through the network with
malicious intentions predicated on downloading, editing, or deleting information. IV.
Vulnerability Assessment
Decision to target
The Air Force Base faces an imminent threat from the Taliban, which operates from the
Middle East. The group has grown substantially through recruitment and radicalization efforts
[ CITATION USD202 \l 1033 ]. It is largely motivated by ideological reasons as it perceives
Americans as infidels while criticizing the nation for its illegitimate activities in the region. It has
a high capability because of the various cells and networks affiliated with the main group
[ CITATION Dep151 \l 1033 ]. Furthermore, the Taliban uses primary tactics such as bombing
and shooting, which makes it a dangerous foe.
Vulnerabilities most likely to be exploited Malicious actors and terrorist groups are likely to exploit the physical security
vulnerability. This is confirmed by recent happenings in 2017 when the base was closed due to a
truck with explosive residue. The truck was allowed entry into the critical infrastructure, with the
18
security not conducting the necessary checks. Furthermore, two vehicles were found outside the
gates, which contained explosive residue. Vulnerability Level
A prescriptive review of the vulnerability level reveals that the Air Force Base has a raw
score of 17, which translates to an assessment rating of 6. This score was derived from various
factors, with the topmost being the level of visibility set at 3. The airbase has a medium visibility
since it is known locally. There is no information about its role or awareness of its operations in
the regional or national frontier. Nonetheless, it serves the local residents and airport by
providing transportation services.
Subsequently, the criticality of the target to the jurisdiction is estimated at 4. The Air
Force base has a high usefulness since it manages a local airport serving various
airlines[ CITATION Han232 \l 1033 ].
The jurisdictional impact is set at 4 because the base has a high economic impact as it
facilitates the transportation of goods and people from the areas [ CITATION Hom15 \l 1033 ].
Likewise, it influences the locale’s security due to its nature and identity as a military
installation. Comparatively, the potential threat element’s level of access is at 1. Just like every
other military installation, Hanscom Air Force Base has a robust security infrastructure. The CI
has set up a 24/7 security patrol with vehicles and personnel being controlled in terms of entry.
Furthermore, each personnel has a designated parking, with unauthorized vehicles being banned
from parking within 300 feet [ CITATION CBS17 \l 1033 ].
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
19
Also, the base does not have any weapons of mass destruction, with a score of 1. This is
attributed to its recent shift from a military installation to one that runs the adjacent airport.
Therefore, the government has set up measures to limit any materials that might contribute to
destruction. Likewise, the scores for the potential site population capacity and collateral mass
casualties are set at 2. The Air Force Base is home to 1,917 people as per the 2021 population
census. This is a substantial decline from the 2119 reported in 2020, with white people
accounting for 49% of the populace. Furthermore, the Hispanic and Asian communities account
for 15% and 7.46% of the final tally[ CITATION Dat23 \l 1033 ]. Comparatively, the potential
for mass casualties is moderate due to the low number of people living within the 1-mile radius.
V.
Consequence Assessment:
Human
The findings derived from the research and critical thinking revealed that the asset is
important to the Bedford community. From a human impact perspective, one can surmise that the
base has a workforce comprising 10,306 workers [ CITATION Han232 \l 1033 ]. The high
number of employees increases the risk of attacks, which contribute to at least 3,500 injuries and
150 deaths. Furthermore, at least 10% of the 1917 people living inside the base are exposed to
death and injuries emanating from an attack by the Taliban [ CITATION Dat23 \l 1033 ].
Similarly, the base is near the MIT Lincoln Library, which accentuates the risk of chemical
attacks. Hazardous materials can also be released into the area, with the probability of theft by
contractors increasing, which can lead to the facility's closure and subsequent disruption of
activities. Economic
20
Second, Hanscom’s importance is elucidated by the economic impact of an attack. As a
key employer, the base contributes at least $6.4 billion to the national economy (Kalb, 2021).
Therefore, a terrorist attack on the facility will lead to numerous losses and disruptions,
especially in the aviation sector. Likewise, an attack might undermine the facility's operations,
with equipment worth $1.2 billion being damaged. This can contribute to below-par performance
in the military aspect, as the base is responsible for sharing information through the C3I&N
system. Public Confidence Furthermore, Hansom Air Force Base enjoys a long-standing relationship with the public.
The latter rely on it for security and employment, with its location minimizing the probability of
incursions. Au contraire, it is likely to report a damaged brand image and reputation if the
Taliban launches an attack against it. The community and general public will perceive it as a
viable target and threat. Therefore, public sentiment will shift against the Air Force base, thus
undermining its relationship with the locals.
Government Capability
Finally, the facility is reverred and important due to its C3I&N system, which enhances
government capabilities. The system is responsible for collecting and doling out intelligence
information vital for domestic and international security. The occurrence of an attack on the asset
can contribute to breaches and decreased efficiency. Other than the C3I&N system, Hanscom
oversees the maintenance of transportation activities at Boston Logan International. Any
disruptive activities will lead to the diversion of planes and loss of revenue [ CITATION
USD202 \l 1033 ]. The local government relies on the base for support with its ill-equipped
21
nature, creating concerns about security management. The local elected officials in the
communities around the base include the mayor and house representatives. The officials provide
manpower and financial resources that can help manage an attack.
Likely Attack Scenario
The likely attack scenario will involve a host of factors, with the topmost being a
cybersecurity and insider attack. The former entails the Taliban launching a ransomware which
will cripple the C3I&N system. Thereafter, they will lock down communication between the base
and other law enforcement agencies. Any recruits within the facility will engage in espionage,
where they collect, edit, or delete critical information pertaining to its operations. The collected
data will then be sold to national enemies, including Russia, with the terrorist cell also holding
some of it for future attacks. Without communication, Hanscom will face the threat of a physical
attack, with the insurgents making their way into the facilities. They will use guns to maim or kill
the employees, thus leading to closure and disruptions.
A.
Level of Damage
Suffice it to say that the level of damage will be high. First, the base will lose its
operational efficiency due to a cybersecurity attack. It will be forced to close down its systems in
order to protect confidential data, as shown in the case of JBS Foods. Likewise, the insider threat
will contribute to a decline in public confidence and government capability. The community will
become wary of the base's operations, thus undermining its reputation and brand image.
Furthermore, the physical attack will contribute to the deaths of 150 people while another 3,500
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
22
are injured. While high, the numbers are similar to the ones reported in the recent Capitol
incursion, where at least 140 people were injured. B.
Severity of Adverse Effects
The severity calculations reveal that the level of consequence is moderate considering the
impact on the government's capabilities, public confidence, and human and economic aspects.
These calculations were derived using a formula that multiplies the consequence by vulnerability
and threat. A score of 288 was derived from the formula as shown below:
T=6
V=6
C=8
=6*6*8
=288
VI.
Countermeasures:
Hanscom's leadership must implement countermeasures to mitigate the terrorist threat. It is
critical that the leadership use contemporary technology in order to increase the base's security
posture across three key areas including physical, cyber, and personnel security.
A.
Recommend Countermeasures
i.
Physical Security
Hanscom Air Force Base will also resort to low-tech elements, including deployable
barriers that rise into position during an attack. The barriers can be rapidly set up on asphalt or
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
23
concrete roads to manage the flow of cars or individuals. Specifically, the base will use Delta's
portable barriers to secure its key facilities[ CITATION Del231 \l 1033 ]. The permanent steel
bollards will be installed at the gate where the necessary checks are conducted. The MP5000 and
DSC1000 barriers from Delta will be purchased and placed across the base. Likewise, the base will mitigate the physical security vulnerabilities through mechanical
and electrical turnstiles. The turnstiles are part of the control system, which will detect and deter
unauthorized entries. The base will ensure that each door has a card or biometric reader that
offers access only to authorized parties [ CITATION Bri18 \l 1033 ]. Specifically, it will utilize
the latest technology, like optical turnstiles that rely on electronic beams and visual interfaces
when managing entry. Figure 9: Turnstines
Source: AIS Technology (2023)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
24
ii.
Cybersecurity
Hanscom Air Force Base relies on the
PEO C3I&N, which is susceptible to various
threats that can impact operational efficiency. In order to protect this critical infrastructure, the
organization must implement access control systems. These systems are automated and manage
access to the controlled area or system. Specifically, the top brass will implement the Mandatory
Access Control, wherein the leaders have control over settings[ CITATION Bar231 \l 1033 ]. The
administrators will determine which parties have privileges while evaluating the nature of their
operations in the system. The MAC model will be complemented by Role-Based Access Control,
which assigns permissions to key members in the air base. The network access will be limited
based on the individual roles and responsibilities within the firm. The government facility can
use SecureLink, which is the latest product in the industry that controls devices and user access
to the C3I&N.
iii.
Personnel Security
The best-fit countermeasure is security patrols, considering the base's sensitive nature.
The management will create a staffing plan to ensure continuous patrols during the day and
night[ CITATION Uni12 \l 1033 ]. The latest trends in patrols involve using dogs that help detect
any intrusion or explosive residues.
Subsequently, a security awareness program will be used to apprise the staff of
Hanscom’s vulnerabilities. The program will be conducted using the latest technologies, like
video calls, to address the individual and geographical needs of staff members. It will play a key
role in distributing responsibility and enhancing concerted efforts towards securing the base. B.
Deter Terrorist Threats
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
25
The deployable barriers and turnstiles will force the actors to rethink attacking the base.
The two work together to manage inflow and outflow, thus prompting alternative measures. They
will deter potential threats by minimizing access to the physical facilities. Also, the organization
will utilize Natural Surveillance CIPD strategies to keep intruders under observation. This
strategy relies on design features that enhance the key facility’s visibility[ CITATION Cit17 \l
1033 ]. The security personnel will be able to observe users and intruders while challenging
inappropriate behavior and reporting it to law enforcement. The technique will deter the behavior
of Taliban insurgents and insiders by increasing awareness that they are being watched. Figure 10: Deployable Barriers
Source: [ CITATION Del231 \l 1033 ]
The natural surveillance also includes setting up physical features and activities that
maximize visibility in a bid to decrease target opportunities. For instance, the base will ensure
adequate illuminatin of public areas through the use of automated rifle series street lights. These
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
26
lights are the net generation which utilize high-efficiency LED Lamp Beads combined with
artificial intelligence. The doors and windows will be designed to look into the parking lot and
other public areas while reducing any obstructions preventing visibility. An example is shown in
figure 2 below: Figure 11: Rifle Street lights
Source: ZGSM-China (2023)
Likewise, the MAC and RABC control will minimize insider threats and ransomware.
They will regulate access to information based on personnel privileges. This will deter any
potential threat emanating from espionage.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
27
Figure 12: Role-Based Access Control
Source: Hoffman (2023)
The final countermeasure involves security patrols and awareness programs. The two are
vital in deterring attacks by ensuring that the personnel actively monitor the facility and its
environs. The awareness program will enhance awareness of Hanscom's vulnerability, thus
tasking personnel with securing the critical assets. This plays a major role in minimizing insider
threats. Figure 13: Security Patrols
Source: [ CITATION Oli20 \l 1033 ]
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
28
C.
Threat Assessment Partnerships
The threat assessment process for Hanscom Air Force Base requires concerted efforts
between the leadership and other agencies. The efforts will entail planning and developing
positive relationships that can improve effective preparation. The subsequent journal identifies
key entities that will help the base improve its security posture.
DHS
The DHS is responsible for managing public security. With headquarters in Washington,
the entity is seminal in providing guidance to national institutions. The agency will support the
asset and threat identification steps by providing background information about probable issues [
CITATION Hom13 \l 1033 ]. State Government of Massachusetts
The State government of Massachusetts works under the auspice of the Governor and
Lieutenant Governor. It establishes local governments and manages law and order in the region.
The base will rely on the state government for support in managing its security posture
[ CITATION Hom13 \l 1033 ]. The state security committee will help identify the pertinent
threats and their likely impact on the local and state residents.
DOT
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
29
The US Department of Transportation operates under the executive. It is responsible for
planning and coordinating transportation projects and setting regulatory guidelines. Since
Hanscom operates the local airport, the resource will guide the assessment process by identifying
key threats and determining mitigation measures[ CITATION Hom13 \l 1033 ]. DOD
Likewise, the Department of Defense is critical for the process. It is tasked with
safeguarding national security from internal/external threats [ CITATION Hom13 \l 1033 ]
. The
resource is seminal in identifying vulnerabilities within the C3&IN system while providing
recommendations on how to curtail them. Bedford Police Department
Fifth, it will incorporate insight from law enforcement agencies such as the New Bedford
Police Department. The department is located near the base and contains at least 29 sworn officer
(Bedford, 2023). It services the entire area and is a member of the state law enforcement council.
The police will be useful in highlighting the main issues (vulnerabilities) in the base’s operations.
They will also play an ancillary role to the military police in mitigating probable attacks. Bedford Engineering/GIS Division Bedford’s Engineering/GIS Division is tasked with creating data layers for the region and
evaluating capital projects (Town of Bedford, 2023).. The division is important in identifying
threats by showing probable vectors of physical attacks. It further develops a list of roadways
which can be used for evacuation purposes during an attack.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
30
Emerson Medical
Likewise, Emerson Medical is located in Concord which is near the base. The hospital
has a capacity of 179 beds with over 300 practitioners (Emerson Health, 2023). The healthcare
agency will estimate the likelihood of deaths and injuries emanating from an attack on the
base[ CITATION Jam22 \l 1033 ]. American Redcross
The eighth agency is the American Red Cross which is a private institution. It largely
deals with crisis management and intervention. The institution will assess risk and provide
insight on how to respond promptly[ CITATION Ame2314 \l 1033 ].
General Services Administration
The penultimate resource includes the DHS (General Services Administration). The GSA
is responsible for managing fed property and safeguarding them. This resource is important as it
will help Hanscom retrofit its security structure to minimize direct attacks. It deals with
government facilities and offers the requisite insight on probable issues and how to mitigate
them. United States Intelligence Community
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
31
Finally, Hanscom will partner with the Intelligence Community due to its role in
collecting security information[ CITATION CIS23 \l 1033 ]. The IC will guide the base
leadership on countermeasures, risk assessment, and mitigation. References
AIS Technology. (2023). Gates and Turnstiles. https://aistechnology.mt/gates-and-turnstiles/
American Red Cross. (2023). Service to the Armed Forces
. Retrieved from American Red Cross: https://www.redcross.org/local/nebraska/about-us/locations/red-cross-service-center-at-
offutt-air-force-base.html
Arctic Wolf. (2022, August 25). 10 Notable Cyber Attacks on Government Agencies
. Retrieved from Arctic Wolf: https://arcticwolf.com/resources/blog/notable-cyber-attacks-on-
government-agencies/
Bedford (2023). About Us. https://bedfordma.gov/225/About-Us
Bennett, B. (2018). Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel.
Wiley.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
32
Brown, J. (2022, January 31). Securing Critical Infrastructure: The Essential Role of Public-
Private Partnerships
. Retrieved from Tenable: https://www.tenable.com/blog/securing-
critical-infrastructure-the-essential-role-of-public-private-partnerships
Byman, D. (2021, January 19). The assault on the U.S. Capitol opens a new chapter in domestic terrorism
. Retrieved from Brookings: https://www.brookings.edu/blog/order-from-
chaos/2021/01/19/the-assault-on-the-u-s-capitol-opens-a-new-chapter-in-domestic-
terrorism/
CBS News. (2017, July 5). U.S. Explosive material scare triggers evacuations at Hanscom Air Force base
. Retrieved from CBS News: https://www.cbsnews.com/news/hanscom-air-
force-base-bomb-squad-massachusetts/
CISA. (2023). Partnerships and Collaboration
. Retrieved from CISA: https://www.cisa.gov/topics/partnerships-and-collaboration
City of Virginia Beach. (2017). Crime Prevention Through Environmental Design.
City of Virginia Beach.
Data USA. (2023). HANSCOM AFB, MA
. Retrieved from Data USA: https://datausa.io/profile/geo/hanscom-afb-ma#:~:text=Hanscom%20AFB%2C%20MA
%20is%20home,any%20other%20race%20or%20ethnicity.
Delta Scientific Corporation. (2023). Portable Barriers
. Retrieved from Delta Scientific Corporation: https://deltascientific.com/high-security/portable-barriers/
Department of Homeland Security. (2015). Attacks on Federal Government: 2001-2013.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
33
Emerson Health (2023). Emerson Hospital Main Campus. https://www.emersonhospital.org/locations/emerson-hospital#:~:text=Emerson
%20Hospital%20Main%20Campus&text=With%20a%20main%20campus
%20located,primary%20care%20doctors%20and%20specialists
.
Global Terrorism Database. (2023). SEARCH RESULTS: 5128 INCIDENTS
. Retrieved from UMD: https://www.start.umd.edu/gtd/search/Results.aspx?
chart=weapon&casualties_type=b&casualties_max=&start_yearonly=2015&end_yearonl
y=2019&dtp2=all&attack=2,1,3,7,4,5,6,8,9&target=2
Grooms, O. (2020, July 16). Military Working Dogs, handlers stick together
. Retrieved from AFCENT: https://www.afcent.af.mil/Units/379th-Air-Expeditionary-
Wing/News/Display/Article/2276360/military-working-dogs-handlers-stick-together/
Hanscom Air Force Base. (2023). About Us
. Retrieved from Hanscom: https://www.hanscom.af.mil/
Hoffman, B. (2023). Access Control: Models and Methods
. Retrieved from Delinea: https://delinea.com/blog/access-control-models-methods#:~:text=There%20are%20four
%20types%20of,RBAC%20or%20RB%2DRBAC)
Homeland Security. (2013). NIPP 2013 Partnering for Critical Infrastructure Security and Resilience.
Homeland Security. (2015). Government Facilities Sector-Specific Plan.
https://www.cisa.gov/sites/default/files/2023-03/nipp-ssp-government-facilities-2015-
508.pdf.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
34
Kalb, G. (2021). Bedford Explained. Retrieved from The Bedford Citizen: https://thebedfordcitizen.org/2021/06/bedford-explained-hanscom Satter, R. (2020, September 3). U.S. court: Mass surveillance program exposed by Snowden was illegal
. Retrieved from Reuters: https://www.reuters.com/article/us-usa-nsa-spying-
idUSKBN25T3CK
Town of Bedford (2023). Engineering / GIS Division. https://www.bedfordma.gov/384/Engineering-GIS-Division
United States. Department of Homeland Security. (2012). Buildings and Infrastructure Protection Series: Primer to Design Safe School Projects in Case of Terrorist Attacks and
School Shootings.
U.S. Department of State Bureau of Counterterrorism. (2020). Annex of Statistical Information Country Reports on Terrorism 2019.
Development Services Group, Inc.
Washington Post. (2021, December 30). Images from Jan.6 depict the U.S. Capitol under attack
. Retrieved from Washington Post: https://www.washingtonpost.com/photography/interactive/2021/january-6-photos/
ZGSM-China (2023). Different types of street lights and their applications. https://www.zgsm-
china.com/blog/different-types-of-street-lights-and-their-applications.html#:~:text=The
%20rifle%20series%20street%20light,control%20systems%20in%20the%20future
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
35
Appendix A
Jurisdictional Threat Rating Worksheet
Worksheet Values:
Existence (Yes = 1, No = 0), Violent History (Yes = 1, No = 0), Intentions (Yes = 2, No = 0), WMD Capability (Yes = 2, No = 0), Targeting (Yes = 4, No = 0).
THREAT FACTORS
Threat
Level (1–10)
Motivation
P = Political
R = Religious
E = Environmental
Ra = Racial
S = Special Interest
(Choose one or more)
WMD Categories
C = Chemical
B = Biological
R = Radiological
N = Nuclear
E = Explosive
(Choose one or more)
PTE
Existen
ce
(1)
Violent
History
(1)
Intenti
ons
(2)
WMD
Capability
(2)
Targeti
ng
(4)
Taliba
n
1
1
2
2
0
6
P, R
E
Threat Factor Definitions
Existence
measures whether the PTE exists or operates within a specific jurisdiction.
History
measures whether the PTE has exhibited criminal or terrorist history.
Intention
refers to credible information that a PTE endorses or threatens to use violence or force or that a PTE is building or obtaining a CBRNE or has plans to do so.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
36
Capability
refers to the existence of credible information that a specific PTE possesses the training, skills, financial means, and other resources necessary to make or acquire a CBRNE to cause mass casualties.
Targeting
refers to the existence of credible information that a PTE is preparing for specific terrorist goals against identifiable targets within jurisdiction.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
37
Appendix B
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
38
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help