Milestone one Revised Draft
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
682
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
11
Uploaded by CountOctopus1696
3-2 Final Project Milestone One: Draft of Introduction and Threat
Identification Sections
Viktoria Prifti
CJ 682 threat Assessment
Professor Henderson
10/12/2023
I.
Asset Identification
Location: 1617, Old Bedford Rd, Hanscom AFB, MA 01731
Crifical Infrastructure Sector: Transportation sector
Responsible Federal Agency: DHS and DTS
The Hanscom Air Force Base was built in 1941 as a military installation and airport. The
base is located in the town of Bedford in Massachusetts. Its sensitivity led to the government
classifying it under the transportation systems sector[ CITATION Han232 \l 1033 ]. This
classification was seminal, considering its role in serving the nation by providing military
services that enhance domestic security. It also operates the adjacent airport that serves civil
airlines. The Department of Transportation and Homeland Security manage the asset’s operations. The researcher chose it due to its significance in both military and civil aspects of American society. The asset is responsible for acquiring vital warfighting systems for the Air Force and other military branches. Likewise, it sets up the systems to ensure continuous connection and communication between warfighters. At least 99% of the air traffic within the base is non-
military[ CITATION Han232 \l 1033 ]. It works with the Massachusetts Port Authority to manage the adjacent civil airport. The airport serves as a corporate reliever for the Boston Logan International Airport. Therefore, the air force base is a viable target for any attacks launched by state enemies. Any disruptions in its operations can lead to deleterious effects for both the military and civilians around the region. Figure 1 below offers a pictorial description of the critical infrastructure.
A brief overview of the TSS sector reveals that it provides transportation of goods
between government facilities. It also allows for the movement of people during regular
operations and after disasters[ CITATION Hom15 \l 1033 ]. The overarching vision of the sector
is to create a secure and resilient system. This system will enable legitimate goods and travelers
to move without disrupting the economy or exhibiting any fear of harm.
Figure 1: Hanscom Air Force Base
Subsequently, its mission is to enhance the nation’s security and resilience posture. This
enhancement is vital in ensuring the safety and security of denizens and goods[ CITATION
Hom15 \l 1033 ]. It also aims to attain key goals such as reducing risk and improving confidence
in the system The sector-specific risks related to TSS include terrorist attacks, aging infrastructure,
cybersecurity, and criminal threats. These risks undermine the sector assets that are in the
interests of national security. Therefore, the DHS and DOT have collaborated with infrastructure
owners and operators to improve its security and resilience against potential or implied harm. II.
Threat Identification
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
This investigator used the following data collection methods to obtain threat research. The results
from each search will be shared within the corresponding sections. a.
Used the Global Terrorism Database to interpret threat data related to the sector
,
which include terrorist groups, weapon types, attack types, and target types.
b.
Conducted a Google search for historical attacks or significant crimes against the sector and
critical infrastructure/key resource (CI/KR).
c.
Conducted a Google search of annual crime reports related to your target.
d.
Conducted a Google search for pertinent domestic terrorist threats against the sector and critical infrastructure/key resource. e.
Interpreted and included related graphs from the Department of State: Annex of Statistical Information (2019) related to perpetrators, targets, tactics, and weapons.
f.
Conducted a cybersecurity database search to identify potential cyberattacks against the sector and asset.
g.
Utilized additional data collection resources such as social media.
h.
Critical Infrastructure Sector
Historical Context
The Global Terrorism Database highlights that there were 5128 incidents against
government targets between 2015 and 2019. Out of the tally, bombings and explosions ranked
the highest[ CITATION Glo23 \l 1033 ]. Furthermore, there were limited reports of armed
assaults, although the number of assassinations remained high. Likewise, the groups hijacked
and took hostages in order to spark fear. Figure 3: Attack Type
Source: [ CITATION Glo23 \l 1033 ]
The most common weapons used by the cells included firearms, which accounted for
2636 incidents[ CITATION Glo23 \l 1033 ]. They were closely followed by explosives and
unknown weapons. Furthermore, incendiaries were far too common among small groups.
Figure 4: Weapons
Source: [ CITATION Glo23 \l 1033 ]
Key Asset
The key asset has also faced past terrorist threats. In 1962, a modified former tanker
crashed as it approached the runway, leading to the aircraft's damage and the deaths of the flight
crew. Fast forward to 2017, the Air Force base was closed down after military personnel found
explosive residue on a moving truck within its vicinity[ CITATION CBS17 \l 1033 ]. The
authorities were alerted with evacuation efforts being conducted to safeguard the asset. The
authorities then assessed two suspicious vehicles, with the items found in them testing positive
for residue. Therefore, it was classified as a high-risk area, with the DHS and DOT calling on
strict safety standards/measures. Nonetheless, the local police annual crime report highlights that
the area has been safe and devoid of any cases of insecurity. This is confirmed by the presence of
a military installation in the region.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Terrorist Groups
The Air Force base faces a threat from both domestic and international terrorist groups.
Specifically, Antifa undermines the asset's operations, considering its position as a military
facility. The group is known for rioting and looting, which can ultimately lead to disruptions.
Another potential threat is the Taliban, which has grown since 1994
[ CITATION USD202 \l 1033
]
. The group has affiliate links and a massive following. Its resourcefulness, therefore, means that
it can launch an attack on the Air Force base using radicalized masses within the borders. Motivation, Capabilities, and Tactics
In most instances, the terrorist groups are motivated by political and ideological reasons [
CITATION Dep151 \l 1033 ]. The cells view it as a sign of an illegitimate regime and can plan to
attack it in order to send a message[ CITATION Dep151 \l 1033 ]. The current security posture is
weak, with terrorists moving around undetected. Finally, the cells have resorted to primary
tactics such as shooting and bombing. C
urrent statistics reveal that the former accounts for 41%
of attacks compared to the latter at 13% as shown in the figure below [CITATION USD202 \l
1033 ]
. The recent bomb scare at the base is a sign that the groups are willing to do what it takes
to disrupt its operations. The shooting method is preferred due to the availability of weapons and
goveremnt flexibility regarding gun ownership.
Figure 3: Primary Tactics
Source: [CITATION USD202 \l 1033 ]
Threat Level
The threat analysis reveals a high likelihood of a terrorist attack occurring on the Air
Force base. Both groups have the resources and intentions to threaten the asset. Furthermore, the
rating reveals that they have WMD capacities such as explosives. The groups' history reveals that
they justify their attacks based on religious and political ideologies. Therefore, it is important for
the government to act and secure the asset.
Appendix A
Jurisdictional Threat Rating Worksheet
Worksheet Values:
Existence (Yes = 1, No = 0), Violent History (Yes = 1, No = 0), Intentions (Yes = 2, No = 0), WMD Capability (Yes = 2, No = 0), Targeting (Yes = 4, No = 0).
THREAT FACTORS
Threat Level (1–10)
Motivation
P = Political
R = Religious
E = Environmental
Ra = Racial
S = Special Interest
(Choose one or more)
WMD Categories
C = Chemical
B = Biological
R = Radiological
N = Nuclear
E = Explosive
(Choose one or more)
PTE
Existence
(1)
Violent
History
(1)
Intention
s
(2)
WMD
Capability
(2)
Targeting
(4)
Taliban
1
1
2
2
0
6
P, R
E
Threat Factor Definitions
Existence
measures whether the PTE exists or operates within a specific jurisdiction.
History
measures whether the PTE has exhibited criminal or terrorist history.
Intention
refers to credible information that a PTE endorses or threatens to use violence or force or that a PTE is building or obtaining a CBRNE or has plans to do so.
Capability
refers to the existence of credible information that a specific PTE possesses the training, skills, financial means, and other resources necessary to make or acquire a CBRNE to cause mass casualties.
Targeting
refers to the existence of credible information that a PTE is preparing for specific terrorist goals against identifiable targets within jurisdiction. References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
U.S. Department of State Bureau of Counterterrorism. (2020). Annex of Statistical Information Country Reports on Terrorism 2019.
Development Services Group, Inc.
CBS News. (2017, July 5). U.S. Explosive material scare triggers evacuations at Hanscom Air Force base
. Retrieved from CBS News: https://www.cbsnews.com/news/hanscom-air-
force-base-bomb-squad-massachusetts/
Department of Homeland Security. (2015). Attacks on Federal Government: 2001-2013.
Global Terrorism Database. (2023). SEARCH RESULTS: 5128 INCIDENTS
. Retrieved from UMD: https://www.start.umd.edu/gtd/search/Results.aspx?
chart=weapon&casualties_type=b&casualties_max=&start_yearonly=2015&end_yearonl
y=2019&dtp2=all&attack=2,1,3,7,4,5,6,8,9&target=2
Hanscom Air Force Base. (2023). About Us
. Retrieved from Hanscom: https://www.hanscom.af.mil/
Homeland Security. (2015). Government Facilities Sector-Specific Plan.
https://www.cisa.gov/sites/default/files/2023-03/nipp-ssp-government-facilities-2015-
508.pdf.