CJ 682 Final Project Revised 9-2

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

682

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

38

Uploaded by CountOctopus1696

Report
1 CJ 682 Final Project Viktoria Prifti CJ 682 Threat Assessment – 9-2 Final Project Milestone Professor Henderson 11/20/2023
2 Abstract This paper presents an overview into Hanscom Air Force Base in Massachusetts. The asset is identified in tande wth the potential targets, probable and actual vulnerabilities. The necessary consequence assessment was conducted to determine the asset’s importance in the community. Nonetheless, the paper predicted the levels of damages while recommending partnerships that can assuage the effects. The insight derived from this report will be useful in enhancing the air force base’s security posture and mitigating the likelihood of future threats. Keywords: threat, vulnerability, air force base, leadership, consequence.
3 Table of Contents I. Asset Identification: ............................................................................................................................. 4 II. Threat Identification ............................................................................................................................ 6 III. Vulnerability Identification ............................................................................................................ 10 IV. Vulnerability Assessment ............................................................................................................... 17 V. Consequence Assessment: ................................................................................................................. 19 VI. Countermeasures: .......................................................................................................................... 22 References ................................................................................................................................................. 31 Appendix A ............................................................................................................................................... 35 Jurisdictional Threat Rating Worksheet ................................................................................................. 35 Threat Factor Definitions ................................................................................................................... 35 Appendix B ............................................................................................................................................... 36
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 I. Asset Identification: Location: 1617, Old Bedford Rd, Hanscom AFB, MA 01731 Crifical Infrastructure Sector: Transportation sector Responsible Federal Agency: DHS and DTS The Hanscom Air Force Base was built in 1941 as a military installation and airport. The base is located in the town of Bedford in Massachusetts. Its sensitivity led to the government classifying it under the transportation systems sector[ CITATION Han232 \l 1033 ]. This classification was seminal, considering its role in serving the nation by providing military services that enhance domestic security. It also operates the adjacent airport that serves civil airlines. The Department of Transportation and Homeland Security manage the asset’s operations. The researcher chose it due to its significance in both military and civil aspects of American society. The asset is responsible for acquiring vital warfighting systems for the Air Force and other military branches. Likewise, it sets up the systems to ensure continuous connection and communication between warfighters. At least 99% of the air traffic within the base is non- military[ CITATION Han232 \l 1033 ]. It works with the Massachusetts Port Authority to manage the adjacent civil airport. The airport serves as a corporate reliever for the Boston Logan International Airport. Therefore, the air force base is a viable target for any attacks launched by state enemies. Any disruptions in its operations can lead to deleterious effects for both the military and civilians around the region. Figure 1 below offers a pictorial description of the critical infrastructure.
5 A brief overview of the TSS sector reveals that it provides transportation of goods between government facilities. It also allows for the movement of people during regular operations and after disasters[ CITATION Hom15 \l 1033 ]. The overarching vision of the sector is to create a secure and resilient system. This system will enable legitimate goods and travelers to move without disrupting the economy or exhibiting any fear of harm. Figure 1: Hanscom Air Force Base Subsequently, its mission is to enhance the nation’s security and resilience posture. This enhancement is vital in ensuring the safety and security of denizens and goods[ CITATION Hom15 \l 1033 ]. It also aims to attain key goals such as reducing risk and improving confidence in the system The sector-specific risks related to TSS include terrorist attacks, aging infrastructure, cybersecurity, and criminal threats. These risks undermine the sector assets that are in the
6 interests of national security. Therefore, the DHS and DOT have collaborated with infrastructure owners and operators to improve its security and resilience against potential or implied harm. II. Threat Identification This investigator used the following data collection methods to obtain threat research. The results from each search will be shared within the corresponding sections. a. Used the Global Terrorism Database to interpret threat data related to the sector , which include terrorist groups, weapon types, attack types, and target types. b. Conducted a Google search for historical attacks or significant crimes against the sector and critical infrastructure/key resource (CI/KR). c. Conducted a Google search of annual crime reports related to your target. d. Conducted a Google search for pertinent domestic terrorist threats against the sector and critical infrastructure/key resource. e. Interpreted and included related graphs from the Department of State: Annex of Statistical Information (2019) related to perpetrators, targets, tactics, and weapons. f. Conducted a cybersecurity database search to identify potential cyberattacks against the sector and asset. g. Utilized additional data collection resources such as social media. h. Critical Infrastructure Sector Historical Context
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 The Global Terrorism Database highlights that there were 5128 incidents against government targets between 2015 and 2019. Out of the tally, bombings and explosions ranked the highest[ CITATION Glo23 \l 1033 ]. Furthermore, there were limited reports of armed assaults, although the number of assassinations remained high. Likewise, the groups hijacked and took hostages in order to spark fear. Figure 2: Attack Type Source: [ CITATION Glo23 \l 1033 ] The most common weapons used by the cells included firearms, which accounted for 2636 incidents[ CITATION Glo23 \l 1033 ]. They were closely followed by explosives and unknown weapons. Furthermore, incendiaries were far too common among small groups.
8 Figure 3: Weapons Source: [ CITATION Glo23 \l 1033 ] Key Asset The key asset has also faced past terrorist threats. In 1962, a modified former tanker crashed as it approached the runway, leading to the aircraft's damage and the deaths of the flight crew. Fast forward to 2017, the Air Force base was closed down after military personnel found explosive residue on a moving truck within its vicinity[ CITATION CBS17 \l 1033 ]. The authorities were alerted with evacuation efforts being conducted to safeguard the asset. The authorities then assessed two suspicious vehicles, with the items found in them testing positive for residue. Therefore, it was classified as a high-risk area, with the DHS and DOT calling on strict safety standards/measures. Nonetheless, the local police annual crime report highlights that the area has been safe and devoid of any cases of insecurity. This is confirmed by the presence of a military installation in the region.
9 Terrorist Groups The Air Force base faces a threat from both domestic and international terrorist groups. The specific threat is posed by the Taliban, which has grown since 1994[ CITATION USD202 \l 1033 ]. The group has affiliate links and a massive following. Its resourcefulness, therefore, means that it can launch an attack on the Air Force base using radicalized masses within the borders. Motivation, Capabilities, and Tactics In most instances, the terrorist groups are motivated by political and ideological reasons [ CITATION Dep151 \l 1033 ]. The cells view it as a sign of an illegitimate regime and can plan to attack it in order to send a message[ CITATION Dep151 \l 1033 ]. The current security posture is weak, with terrorists moving around undetected. Finally, the cells have resorted to primary tactics such as shooting and bombing. Current statistics reveal that the former accounts for 41% of attacks compared to the latter at 13% as shown in the figure below [CITATION USD202 \l 1033 ]. The recent bomb scare at the base is a sign that the groups are willing to do what it takes to disrupt its operations. The shooting method is preferred due to the availability of weapons and goveremnt flexibility regarding gun ownership.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10 Figure 4: Primary Tactics Source: [CITATION USD202 \l 1033 ] Threat Level The threat analysis reveals a high likelihood of a terrorist attack occurring on the Air Force base. Both groups have the resources and intentions to threaten the asset. Furthermore, the rating reveals that they have WMD capacities such as explosives. The groups' history reveals that they justify their attacks based on religious and political ideologies. Therefore, it is important for the government to act and secure the asset. III. Vulnerability Identification Hanscom Air Force Base is guided by the mission of “providing worldwide support for the Air Force Life Cycle Management Center and outstanding quality-of-life opportunities for our
11 military personnel, their family members, and the many workers who are part of Team Hanscom” [ CITATION Han232 \l 1033 ]. Overview of Property Hanscom Air Force Base is located in the state of Massachusetts. The infrastructure is set up on a land spanning 846 acres which contains at least 155 buildings. The topmost building is the medical clinic, which serves the needs of the residents [ CITATION Han232 \l 1033 ]. Likewise, it houses auto skills, force aid, barber shop-exchange, base-exchange, and churches. Most of the buildings in the area are 731 privatized family housing for current or former military officers [ CITATION Han232 \l 1033 ]. Also, the base is home to numerous civilians from divergent backgrounds. It has a surrounding perimeter wall, which is bordered by residential properties. Figure 5: Base Map Source: [ CITATION Han232 \l 1033 ]
12 Figure 6: Critical asset Source: [ CITATION Han232 \l 1033 ] Operating Elements The administrative operating element is managed by the Department of Transportation and Homeland Security. The two agencies work together with the base commander to set up a robust administrative structure that ensures operational efficiency [ CITATION Han232 \l 1033 ]. The base commander also liaises and collaborates with the Massachusetts Port Authority to control the flow of civil airlines in the adjacent airport. The current base commander is Colonel Taona Enriquez, who works with Major General Antony Genatempo to uphold security and continued operations [ CITATION Han232 \l 1033 ]. The second functional element is the PEO C3I&N, which consists of command, control, communications, and intelligence and networking systems. The system was set up at the base to collect information that is shared with combatant commanders [ CITATION Han232 \l 1033 ]. The C3I&N is also responsible for coalition and joint cyberspace, as well as developing
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
13 cryptologic algorithms that safeguard military data. It connects various systems across the force with the intention of sustaining war-winning capabilities. People The administrative element contains 5 leaders/executives, as shown in the figure below. Major General Anthony Genatempo is the executive officer for the C3I&N and is flanked by Scott C. Hardiman. The latter is the civilian director responsible for the NC3 and program execution. Likewise, Steven Wert is the program executive officer (PEO) for the base's life cycle management center. The base commander (Taona) works together with Chief Master Sergeant Alan Weary to manage the facility’s operations. Figure 7: Leadership Source: [ CITATION Han232 \l 1033 ] The C3I&N has a total workforce of 10,306 employees. Out of the total, at least 899 are active duty service men, with 400 working under the National Guard [ CITATION Han232 \l 1033 ]. Likewise, the LCMC and DOD civilians account for 1,743 and 555 employees compared to non-DOD and non-appropriated fund civilians at 92 and 170, respectively [ CITATION Han232 \l 1033 ]. There are 2,208 contractors, with the MIT Lincoln lab having 4058 employees.
14 Valuable and Critical Assets The topmost valuable and critical asset at the facility is its cyber systems. These systems (C3I&N) are responsible for the collection of intelligence information, which is shared with combatant commanders to ensure decision-making. Subsequently, the Boston Logan International Airport is critical to its operations with regard to the movement of goods and people. Proprietary Information The cyber technology systems contain proprietary files and data that can be targeted by terrorists. Specifically, the C3I&N is used to collect intelligence information and protect the nation's network infrastructure. It contains data regarding missions and America's security posture, which can be detrimental if accessed by the wrong parties. Likewise, the adjacent civilian airport has computer systems with personally identifiable information. Terrorists might gain access to the systems and use the information for identity theft purposes in order to gain entry into Hanscom Air Force base. Reputation Hanscom Air Force Base has a positive reputation in the area due to its operations and security mechanisms. The C3I&N has, however, come under intense scrutiny as it collects pertinent information about domestic and international operations. The data collection process is often conducted without consent, which might violate citizen privacy. Nonetheless, the loss of information can contribute to attacks and damaged organizational reputation. Protection Justification
15 Both the C3I&N and Air Force base must be protected because of their two-pronged role in warfighting and transportation. For instance, any disruptions to the former can contribute to lost connection and communication between servicemen. The occurrence of an attack on the latter will ultimately lead to disrupted transportation. Common vulnerabilities Hanscom Air Force base is faced with three different vulnerabilities which affect its operational efficiency. The first vulnerability pertains to cybersecurity, with the facility lacking the necessary software and measures to counteract attacks. The specific information used to identify this vulnerability was collected from the DHS's Sector Specific Plan (Homeland Security, 2015). The plan denotes that government facilities like the base have witnessed a surge in reported malware or ransomware attacks. Even though Hansom has a robust cybersecurity system, it still faces the likelihood of an attack, considering the fast-paced nature of technology. The specific location that could be attacked is its communication systems. This scenario can include hackers gaining access to communications and barring user privileges (Arctic Wolf, 2022). They will likely use a ransomware method to exploit the vulnerability, as shown in the case of JBS Foods. The actor will access this vulnerability through weak firewalls and open ports. Subsequently, the critical infrastructure has a physical security vulnerability. This is confirmed by the recent Capitol Attacks, which saw people accessing government facilities without authorization (Byman, 2021). The base's operations offices will be attacked, thereby undermining the movement of people in the airport. Furthermore, the likely potential attack
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
16 scenario will involve individuals using weapons like guns. The threat actors will access this vulnerability through weak access control policies or systems. The final vulnerability pertains to insider threats often launched by contractors or employees. I identified this information based on the Snowden scandal, whereby a worker leaked sensitive information about a federal government facility (Satter, 2020). The specific location that will be attacked is the facility's system. The employee or contractor can access this vulnerability using their privileges. They will then maneuver through the systems by editing, downloading, or deleting some of the information. The probable method of attack will involve espionage, with the information being sold to the highest bidder, as shown by Edward Snowden. Figure 8: U.S. Capitol Attack Source: [ CITATION Was21 \l 1033 ] Probable Vulnerabilities
17 At Hanscom Air Force Base, the common vulnerabilities include cybersecurity, with attackers gaining access through the communication systems. The attacks will be launched on the C3I&N, thereby leading to communication and data maintenance issues. Subsequently, the CI faces the risk of physical security breaches, with attackers gaining access to the airport and key buildings. They will likely use guns and capitalize on vulnerabilities such as weak access control policies at the gate. The final vulnerability is insider threats, with an employee or contractor using their privileges to access the system. They will then move through the network with malicious intentions predicated on downloading, editing, or deleting information. IV. Vulnerability Assessment Decision to target The Air Force Base faces an imminent threat from the Taliban, which operates from the Middle East. The group has grown substantially through recruitment and radicalization efforts [ CITATION USD202 \l 1033 ]. It is largely motivated by ideological reasons as it perceives Americans as infidels while criticizing the nation for its illegitimate activities in the region. It has a high capability because of the various cells and networks affiliated with the main group [ CITATION Dep151 \l 1033 ]. Furthermore, the Taliban uses primary tactics such as bombing and shooting, which makes it a dangerous foe. Vulnerabilities most likely to be exploited Malicious actors and terrorist groups are likely to exploit the physical security vulnerability. This is confirmed by recent happenings in 2017 when the base was closed due to a truck with explosive residue. The truck was allowed entry into the critical infrastructure, with the
18 security not conducting the necessary checks. Furthermore, two vehicles were found outside the gates, which contained explosive residue. Vulnerability Level A prescriptive review of the vulnerability level reveals that the Air Force Base has a raw score of 17, which translates to an assessment rating of 6. This score was derived from various factors, with the topmost being the level of visibility set at 3. The airbase has a medium visibility since it is known locally. There is no information about its role or awareness of its operations in the regional or national frontier. Nonetheless, it serves the local residents and airport by providing transportation services. Subsequently, the criticality of the target to the jurisdiction is estimated at 4. The Air Force base has a high usefulness since it manages a local airport serving various airlines[ CITATION Han232 \l 1033 ]. The jurisdictional impact is set at 4 because the base has a high economic impact as it facilitates the transportation of goods and people from the areas [ CITATION Hom15 \l 1033 ]. Likewise, it influences the locale’s security due to its nature and identity as a military installation. Comparatively, the potential threat element’s level of access is at 1. Just like every other military installation, Hanscom Air Force Base has a robust security infrastructure. The CI has set up a 24/7 security patrol with vehicles and personnel being controlled in terms of entry. Furthermore, each personnel has a designated parking, with unauthorized vehicles being banned from parking within 300 feet [ CITATION CBS17 \l 1033 ].
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
19 Also, the base does not have any weapons of mass destruction, with a score of 1. This is attributed to its recent shift from a military installation to one that runs the adjacent airport. Therefore, the government has set up measures to limit any materials that might contribute to destruction. Likewise, the scores for the potential site population capacity and collateral mass casualties are set at 2. The Air Force Base is home to 1,917 people as per the 2021 population census. This is a substantial decline from the 2119 reported in 2020, with white people accounting for 49% of the populace. Furthermore, the Hispanic and Asian communities account for 15% and 7.46% of the final tally[ CITATION Dat23 \l 1033 ]. Comparatively, the potential for mass casualties is moderate due to the low number of people living within the 1-mile radius. V. Consequence Assessment: Human The findings derived from the research and critical thinking revealed that the asset is important to the Bedford community. From a human impact perspective, one can surmise that the base has a workforce comprising 10,306 workers [ CITATION Han232 \l 1033 ]. The high number of employees increases the risk of attacks, which contribute to at least 3,500 injuries and 150 deaths. Furthermore, at least 10% of the 1917 people living inside the base are exposed to death and injuries emanating from an attack by the Taliban [ CITATION Dat23 \l 1033 ]. Similarly, the base is near the MIT Lincoln Library, which accentuates the risk of chemical attacks. Hazardous materials can also be released into the area, with the probability of theft by contractors increasing, which can lead to the facility's closure and subsequent disruption of activities. Economic
20 Second, Hanscom’s importance is elucidated by the economic impact of an attack. As a key employer, the base contributes at least $6.4 billion to the national economy (Kalb, 2021). Therefore, a terrorist attack on the facility will lead to numerous losses and disruptions, especially in the aviation sector. Likewise, an attack might undermine the facility's operations, with equipment worth $1.2 billion being damaged. This can contribute to below-par performance in the military aspect, as the base is responsible for sharing information through the C3I&N system. Public Confidence Furthermore, Hansom Air Force Base enjoys a long-standing relationship with the public. The latter rely on it for security and employment, with its location minimizing the probability of incursions. Au contraire, it is likely to report a damaged brand image and reputation if the Taliban launches an attack against it. The community and general public will perceive it as a viable target and threat. Therefore, public sentiment will shift against the Air Force base, thus undermining its relationship with the locals. Government Capability Finally, the facility is reverred and important due to its C3I&N system, which enhances government capabilities. The system is responsible for collecting and doling out intelligence information vital for domestic and international security. The occurrence of an attack on the asset can contribute to breaches and decreased efficiency. Other than the C3I&N system, Hanscom oversees the maintenance of transportation activities at Boston Logan International. Any disruptive activities will lead to the diversion of planes and loss of revenue [ CITATION USD202 \l 1033 ]. The local government relies on the base for support with its ill-equipped
21 nature, creating concerns about security management. The local elected officials in the communities around the base include the mayor and house representatives. The officials provide manpower and financial resources that can help manage an attack. Likely Attack Scenario The likely attack scenario will involve a host of factors, with the topmost being a cybersecurity and insider attack. The former entails the Taliban launching a ransomware which will cripple the C3I&N system. Thereafter, they will lock down communication between the base and other law enforcement agencies. Any recruits within the facility will engage in espionage, where they collect, edit, or delete critical information pertaining to its operations. The collected data will then be sold to national enemies, including Russia, with the terrorist cell also holding some of it for future attacks. Without communication, Hanscom will face the threat of a physical attack, with the insurgents making their way into the facilities. They will use guns to maim or kill the employees, thus leading to closure and disruptions. A. Level of Damage Suffice it to say that the level of damage will be high. First, the base will lose its operational efficiency due to a cybersecurity attack. It will be forced to close down its systems in order to protect confidential data, as shown in the case of JBS Foods. Likewise, the insider threat will contribute to a decline in public confidence and government capability. The community will become wary of the base's operations, thus undermining its reputation and brand image. Furthermore, the physical attack will contribute to the deaths of 150 people while another 3,500
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
22 are injured. While high, the numbers are similar to the ones reported in the recent Capitol incursion, where at least 140 people were injured. B. Severity of Adverse Effects The severity calculations reveal that the level of consequence is moderate considering the impact on the government's capabilities, public confidence, and human and economic aspects. These calculations were derived using a formula that multiplies the consequence by vulnerability and threat. A score of 288 was derived from the formula as shown below: T=6 V=6 C=8 =6*6*8 =288 VI. Countermeasures: Hanscom's leadership must implement countermeasures to mitigate the terrorist threat. It is critical that the leadership use contemporary technology in order to increase the base's security posture across three key areas including physical, cyber, and personnel security. A. Recommend Countermeasures i. Physical Security Hanscom Air Force Base will also resort to low-tech elements, including deployable barriers that rise into position during an attack. The barriers can be rapidly set up on asphalt or
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
23 concrete roads to manage the flow of cars or individuals. Specifically, the base will use Delta's portable barriers to secure its key facilities[ CITATION Del231 \l 1033 ]. The permanent steel bollards will be installed at the gate where the necessary checks are conducted. The MP5000 and DSC1000 barriers from Delta will be purchased and placed across the base. Likewise, the base will mitigate the physical security vulnerabilities through mechanical and electrical turnstiles. The turnstiles are part of the control system, which will detect and deter unauthorized entries. The base will ensure that each door has a card or biometric reader that offers access only to authorized parties [ CITATION Bri18 \l 1033 ]. Specifically, it will utilize the latest technology, like optical turnstiles that rely on electronic beams and visual interfaces when managing entry. Figure 9: Turnstines Source: AIS Technology (2023)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
24 ii. Cybersecurity Hanscom Air Force Base relies on the PEO C3I&N, which is susceptible to various threats that can impact operational efficiency. In order to protect this critical infrastructure, the organization must implement access control systems. These systems are automated and manage access to the controlled area or system. Specifically, the top brass will implement the Mandatory Access Control, wherein the leaders have control over settings[ CITATION Bar231 \l 1033 ]. The administrators will determine which parties have privileges while evaluating the nature of their operations in the system. The MAC model will be complemented by Role-Based Access Control, which assigns permissions to key members in the air base. The network access will be limited based on the individual roles and responsibilities within the firm. The government facility can use SecureLink, which is the latest product in the industry that controls devices and user access to the C3I&N. iii. Personnel Security The best-fit countermeasure is security patrols, considering the base's sensitive nature. The management will create a staffing plan to ensure continuous patrols during the day and night[ CITATION Uni12 \l 1033 ]. The latest trends in patrols involve using dogs that help detect any intrusion or explosive residues. Subsequently, a security awareness program will be used to apprise the staff of Hanscom’s vulnerabilities. The program will be conducted using the latest technologies, like video calls, to address the individual and geographical needs of staff members. It will play a key role in distributing responsibility and enhancing concerted efforts towards securing the base. B. Deter Terrorist Threats
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
25 The deployable barriers and turnstiles will force the actors to rethink attacking the base. The two work together to manage inflow and outflow, thus prompting alternative measures. They will deter potential threats by minimizing access to the physical facilities. Also, the organization will utilize Natural Surveillance CIPD strategies to keep intruders under observation. This strategy relies on design features that enhance the key facility’s visibility[ CITATION Cit17 \l 1033 ]. The security personnel will be able to observe users and intruders while challenging inappropriate behavior and reporting it to law enforcement. The technique will deter the behavior of Taliban insurgents and insiders by increasing awareness that they are being watched. Figure 10: Deployable Barriers Source: [ CITATION Del231 \l 1033 ] The natural surveillance also includes setting up physical features and activities that maximize visibility in a bid to decrease target opportunities. For instance, the base will ensure adequate illuminatin of public areas through the use of automated rifle series street lights. These
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
26 lights are the net generation which utilize high-efficiency LED Lamp Beads combined with artificial intelligence. The doors and windows will be designed to look into the parking lot and other public areas while reducing any obstructions preventing visibility. An example is shown in figure 2 below: Figure 11: Rifle Street lights Source: ZGSM-China (2023) Likewise, the MAC and RABC control will minimize insider threats and ransomware. They will regulate access to information based on personnel privileges. This will deter any potential threat emanating from espionage.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
27 Figure 12: Role-Based Access Control Source: Hoffman (2023) The final countermeasure involves security patrols and awareness programs. The two are vital in deterring attacks by ensuring that the personnel actively monitor the facility and its environs. The awareness program will enhance awareness of Hanscom's vulnerability, thus tasking personnel with securing the critical assets. This plays a major role in minimizing insider threats. Figure 13: Security Patrols Source: [ CITATION Oli20 \l 1033 ]
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
28 C. Threat Assessment Partnerships The threat assessment process for Hanscom Air Force Base requires concerted efforts between the leadership and other agencies. The efforts will entail planning and developing positive relationships that can improve effective preparation. The subsequent journal identifies key entities that will help the base improve its security posture. DHS The DHS is responsible for managing public security. With headquarters in Washington, the entity is seminal in providing guidance to national institutions. The agency will support the asset and threat identification steps by providing background information about probable issues [ CITATION Hom13 \l 1033 ]. State Government of Massachusetts The State government of Massachusetts works under the auspice of the Governor and Lieutenant Governor. It establishes local governments and manages law and order in the region. The base will rely on the state government for support in managing its security posture [ CITATION Hom13 \l 1033 ]. The state security committee will help identify the pertinent threats and their likely impact on the local and state residents. DOT
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
29 The US Department of Transportation operates under the executive. It is responsible for planning and coordinating transportation projects and setting regulatory guidelines. Since Hanscom operates the local airport, the resource will guide the assessment process by identifying key threats and determining mitigation measures[ CITATION Hom13 \l 1033 ]. DOD Likewise, the Department of Defense is critical for the process. It is tasked with safeguarding national security from internal/external threats [ CITATION Hom13 \l 1033 ] . The resource is seminal in identifying vulnerabilities within the C3&IN system while providing recommendations on how to curtail them. Bedford Police Department Fifth, it will incorporate insight from law enforcement agencies such as the New Bedford Police Department. The department is located near the base and contains at least 29 sworn officer (Bedford, 2023). It services the entire area and is a member of the state law enforcement council. The police will be useful in highlighting the main issues (vulnerabilities) in the base’s operations. They will also play an ancillary role to the military police in mitigating probable attacks. Bedford Engineering/GIS Division Bedford’s Engineering/GIS Division is tasked with creating data layers for the region and evaluating capital projects (Town of Bedford, 2023).. The division is important in identifying threats by showing probable vectors of physical attacks. It further develops a list of roadways which can be used for evacuation purposes during an attack.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
30 Emerson Medical Likewise, Emerson Medical is located in Concord which is near the base. The hospital has a capacity of 179 beds with over 300 practitioners (Emerson Health, 2023). The healthcare agency will estimate the likelihood of deaths and injuries emanating from an attack on the base[ CITATION Jam22 \l 1033 ]. American Redcross The eighth agency is the American Red Cross which is a private institution. It largely deals with crisis management and intervention. The institution will assess risk and provide insight on how to respond promptly[ CITATION Ame2314 \l 1033 ]. General Services Administration The penultimate resource includes the DHS (General Services Administration). The GSA is responsible for managing fed property and safeguarding them. This resource is important as it will help Hanscom retrofit its security structure to minimize direct attacks. It deals with government facilities and offers the requisite insight on probable issues and how to mitigate them. United States Intelligence Community
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
31 Finally, Hanscom will partner with the Intelligence Community due to its role in collecting security information[ CITATION CIS23 \l 1033 ]. The IC will guide the base leadership on countermeasures, risk assessment, and mitigation. References AIS Technology. (2023). Gates and Turnstiles. https://aistechnology.mt/gates-and-turnstiles/ American Red Cross. (2023). Service to the Armed Forces . Retrieved from American Red Cross: https://www.redcross.org/local/nebraska/about-us/locations/red-cross-service-center-at- offutt-air-force-base.html Arctic Wolf. (2022, August 25). 10 Notable Cyber Attacks on Government Agencies . Retrieved from Arctic Wolf: https://arcticwolf.com/resources/blog/notable-cyber-attacks-on- government-agencies/ Bedford (2023). About Us. https://bedfordma.gov/225/About-Us Bennett, B. (2018). Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel. Wiley.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
32 Brown, J. (2022, January 31). Securing Critical Infrastructure: The Essential Role of Public- Private Partnerships . Retrieved from Tenable: https://www.tenable.com/blog/securing- critical-infrastructure-the-essential-role-of-public-private-partnerships Byman, D. (2021, January 19). The assault on the U.S. Capitol opens a new chapter in domestic terrorism . Retrieved from Brookings: https://www.brookings.edu/blog/order-from- chaos/2021/01/19/the-assault-on-the-u-s-capitol-opens-a-new-chapter-in-domestic- terrorism/ CBS News. (2017, July 5). U.S. Explosive material scare triggers evacuations at Hanscom Air Force base . Retrieved from CBS News: https://www.cbsnews.com/news/hanscom-air- force-base-bomb-squad-massachusetts/ CISA. (2023). Partnerships and Collaboration . Retrieved from CISA: https://www.cisa.gov/topics/partnerships-and-collaboration City of Virginia Beach. (2017). Crime Prevention Through Environmental Design. City of Virginia Beach. Data USA. (2023). HANSCOM AFB, MA . Retrieved from Data USA: https://datausa.io/profile/geo/hanscom-afb-ma#:~:text=Hanscom%20AFB%2C%20MA %20is%20home,any%20other%20race%20or%20ethnicity. Delta Scientific Corporation. (2023). Portable Barriers . Retrieved from Delta Scientific Corporation: https://deltascientific.com/high-security/portable-barriers/ Department of Homeland Security. (2015). Attacks on Federal Government: 2001-2013.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
33 Emerson Health (2023). Emerson Hospital Main Campus. https://www.emersonhospital.org/locations/emerson-hospital#:~:text=Emerson %20Hospital%20Main%20Campus&text=With%20a%20main%20campus %20located,primary%20care%20doctors%20and%20specialists . Global Terrorism Database. (2023). SEARCH RESULTS: 5128 INCIDENTS . Retrieved from UMD: https://www.start.umd.edu/gtd/search/Results.aspx? chart=weapon&casualties_type=b&casualties_max=&start_yearonly=2015&end_yearonl y=2019&dtp2=all&attack=2,1,3,7,4,5,6,8,9&target=2 Grooms, O. (2020, July 16). Military Working Dogs, handlers stick together . Retrieved from AFCENT: https://www.afcent.af.mil/Units/379th-Air-Expeditionary- Wing/News/Display/Article/2276360/military-working-dogs-handlers-stick-together/ Hanscom Air Force Base. (2023). About Us . Retrieved from Hanscom: https://www.hanscom.af.mil/ Hoffman, B. (2023). Access Control: Models and Methods . Retrieved from Delinea: https://delinea.com/blog/access-control-models-methods#:~:text=There%20are%20four %20types%20of,RBAC%20or%20RB%2DRBAC) Homeland Security. (2013). NIPP 2013 Partnering for Critical Infrastructure Security and Resilience. Homeland Security. (2015). Government Facilities Sector-Specific Plan. https://www.cisa.gov/sites/default/files/2023-03/nipp-ssp-government-facilities-2015- 508.pdf.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
34 Kalb, G. (2021). Bedford Explained. Retrieved from The Bedford Citizen: https://thebedfordcitizen.org/2021/06/bedford-explained-hanscom Satter, R. (2020, September 3). U.S. court: Mass surveillance program exposed by Snowden was illegal . Retrieved from Reuters: https://www.reuters.com/article/us-usa-nsa-spying- idUSKBN25T3CK Town of Bedford (2023). Engineering / GIS Division. https://www.bedfordma.gov/384/Engineering-GIS-Division United States. Department of Homeland Security. (2012). Buildings and Infrastructure Protection Series: Primer to Design Safe School Projects in Case of Terrorist Attacks and School Shootings. U.S. Department of State Bureau of Counterterrorism. (2020). Annex of Statistical Information Country Reports on Terrorism 2019. Development Services Group, Inc. Washington Post. (2021, December 30). Images from Jan.6 depict the U.S. Capitol under attack . Retrieved from Washington Post: https://www.washingtonpost.com/photography/interactive/2021/january-6-photos/ ZGSM-China (2023). Different types of street lights and their applications. https://www.zgsm- china.com/blog/different-types-of-street-lights-and-their-applications.html#:~:text=The %20rifle%20series%20street%20light,control%20systems%20in%20the%20future
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
35 Appendix A Jurisdictional Threat Rating Worksheet Worksheet Values: Existence (Yes = 1, No = 0), Violent History (Yes = 1, No = 0), Intentions (Yes = 2, No = 0), WMD Capability (Yes = 2, No = 0), Targeting (Yes = 4, No = 0). THREAT FACTORS Threat Level (1–10) Motivation P = Political R = Religious E = Environmental Ra = Racial S = Special Interest (Choose one or more) WMD Categories C = Chemical B = Biological R = Radiological N = Nuclear E = Explosive (Choose one or more) PTE Existen ce (1) Violent History (1) Intenti ons (2) WMD Capability (2) Targeti ng (4) Taliba n 1 1 2 2 0 6 P, R E Threat Factor Definitions Existence measures whether the PTE exists or operates within a specific jurisdiction. History measures whether the PTE has exhibited criminal or terrorist history. Intention refers to credible information that a PTE endorses or threatens to use violence or force or that a PTE is building or obtaining a CBRNE or has plans to do so.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
36 Capability refers to the existence of credible information that a specific PTE possesses the training, skills, financial means, and other resources necessary to make or acquire a CBRNE to cause mass casualties. Targeting refers to the existence of credible information that a PTE is preparing for specific terrorist goals against identifiable targets within jurisdiction.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
37 Appendix B
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
38
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help