Milestone one Revised Draft

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

682

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

11

Uploaded by CountOctopus1696

Report
3-2 Final Project Milestone One: Draft of Introduction and Threat Identification Sections Viktoria Prifti CJ 682 threat Assessment Professor Henderson 10/12/2023
I. Asset Identification Location: 1617, Old Bedford Rd, Hanscom AFB, MA 01731 Crifical Infrastructure Sector: Transportation sector Responsible Federal Agency: DHS and DTS The Hanscom Air Force Base was built in 1941 as a military installation and airport. The base is located in the town of Bedford in Massachusetts. Its sensitivity led to the government classifying it under the transportation systems sector[ CITATION Han232 \l 1033 ]. This classification was seminal, considering its role in serving the nation by providing military services that enhance domestic security. It also operates the adjacent airport that serves civil airlines. The Department of Transportation and Homeland Security manage the asset’s operations. The researcher chose it due to its significance in both military and civil aspects of American society. The asset is responsible for acquiring vital warfighting systems for the Air Force and other military branches. Likewise, it sets up the systems to ensure continuous connection and communication between warfighters. At least 99% of the air traffic within the base is non- military[ CITATION Han232 \l 1033 ]. It works with the Massachusetts Port Authority to manage the adjacent civil airport. The airport serves as a corporate reliever for the Boston Logan International Airport. Therefore, the air force base is a viable target for any attacks launched by state enemies. Any disruptions in its operations can lead to deleterious effects for both the military and civilians around the region. Figure 1 below offers a pictorial description of the critical infrastructure.
A brief overview of the TSS sector reveals that it provides transportation of goods between government facilities. It also allows for the movement of people during regular operations and after disasters[ CITATION Hom15 \l 1033 ]. The overarching vision of the sector is to create a secure and resilient system. This system will enable legitimate goods and travelers to move without disrupting the economy or exhibiting any fear of harm. Figure 1: Hanscom Air Force Base Subsequently, its mission is to enhance the nation’s security and resilience posture. This enhancement is vital in ensuring the safety and security of denizens and goods[ CITATION Hom15 \l 1033 ]. It also aims to attain key goals such as reducing risk and improving confidence in the system The sector-specific risks related to TSS include terrorist attacks, aging infrastructure, cybersecurity, and criminal threats. These risks undermine the sector assets that are in the interests of national security. Therefore, the DHS and DOT have collaborated with infrastructure owners and operators to improve its security and resilience against potential or implied harm. II. Threat Identification
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
This investigator used the following data collection methods to obtain threat research. The results from each search will be shared within the corresponding sections. a. Used the Global Terrorism Database to interpret threat data related to the sector , which include terrorist groups, weapon types, attack types, and target types. b. Conducted a Google search for historical attacks or significant crimes against the sector and critical infrastructure/key resource (CI/KR). c. Conducted a Google search of annual crime reports related to your target. d. Conducted a Google search for pertinent domestic terrorist threats against the sector and critical infrastructure/key resource. e. Interpreted and included related graphs from the Department of State: Annex of Statistical Information (2019) related to perpetrators, targets, tactics, and weapons. f. Conducted a cybersecurity database search to identify potential cyberattacks against the sector and asset. g. Utilized additional data collection resources such as social media. h. Critical Infrastructure Sector Historical Context The Global Terrorism Database highlights that there were 5128 incidents against government targets between 2015 and 2019. Out of the tally, bombings and explosions ranked the highest[ CITATION Glo23 \l 1033 ]. Furthermore, there were limited reports of armed
assaults, although the number of assassinations remained high. Likewise, the groups hijacked and took hostages in order to spark fear. Figure 3: Attack Type Source: [ CITATION Glo23 \l 1033 ] The most common weapons used by the cells included firearms, which accounted for 2636 incidents[ CITATION Glo23 \l 1033 ]. They were closely followed by explosives and unknown weapons. Furthermore, incendiaries were far too common among small groups.
Figure 4: Weapons Source: [ CITATION Glo23 \l 1033 ] Key Asset The key asset has also faced past terrorist threats. In 1962, a modified former tanker crashed as it approached the runway, leading to the aircraft's damage and the deaths of the flight crew. Fast forward to 2017, the Air Force base was closed down after military personnel found explosive residue on a moving truck within its vicinity[ CITATION CBS17 \l 1033 ]. The authorities were alerted with evacuation efforts being conducted to safeguard the asset. The authorities then assessed two suspicious vehicles, with the items found in them testing positive for residue. Therefore, it was classified as a high-risk area, with the DHS and DOT calling on strict safety standards/measures. Nonetheless, the local police annual crime report highlights that the area has been safe and devoid of any cases of insecurity. This is confirmed by the presence of a military installation in the region.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Terrorist Groups The Air Force base faces a threat from both domestic and international terrorist groups. Specifically, Antifa undermines the asset's operations, considering its position as a military facility. The group is known for rioting and looting, which can ultimately lead to disruptions. Another potential threat is the Taliban, which has grown since 1994 [ CITATION USD202 \l 1033 ] . The group has affiliate links and a massive following. Its resourcefulness, therefore, means that it can launch an attack on the Air Force base using radicalized masses within the borders. Motivation, Capabilities, and Tactics In most instances, the terrorist groups are motivated by political and ideological reasons [ CITATION Dep151 \l 1033 ]. The cells view it as a sign of an illegitimate regime and can plan to attack it in order to send a message[ CITATION Dep151 \l 1033 ]. The current security posture is weak, with terrorists moving around undetected. Finally, the cells have resorted to primary tactics such as shooting and bombing. C urrent statistics reveal that the former accounts for 41% of attacks compared to the latter at 13% as shown in the figure below [CITATION USD202 \l 1033 ] . The recent bomb scare at the base is a sign that the groups are willing to do what it takes to disrupt its operations. The shooting method is preferred due to the availability of weapons and goveremnt flexibility regarding gun ownership.
Figure 3: Primary Tactics Source: [CITATION USD202 \l 1033 ] Threat Level The threat analysis reveals a high likelihood of a terrorist attack occurring on the Air Force base. Both groups have the resources and intentions to threaten the asset. Furthermore, the rating reveals that they have WMD capacities such as explosives. The groups' history reveals that they justify their attacks based on religious and political ideologies. Therefore, it is important for the government to act and secure the asset. Appendix A
Jurisdictional Threat Rating Worksheet Worksheet Values: Existence (Yes = 1, No = 0), Violent History (Yes = 1, No = 0), Intentions (Yes = 2, No = 0), WMD Capability (Yes = 2, No = 0), Targeting (Yes = 4, No = 0). THREAT FACTORS Threat Level (1–10) Motivation P = Political R = Religious E = Environmental Ra = Racial S = Special Interest (Choose one or more) WMD Categories C = Chemical B = Biological R = Radiological N = Nuclear E = Explosive (Choose one or more) PTE Existence (1) Violent History (1) Intention s (2) WMD Capability (2) Targeting (4) Taliban 1 1 2 2 0 6 P, R E Threat Factor Definitions Existence measures whether the PTE exists or operates within a specific jurisdiction. History measures whether the PTE has exhibited criminal or terrorist history. Intention refers to credible information that a PTE endorses or threatens to use violence or force or that a PTE is building or obtaining a CBRNE or has plans to do so. Capability refers to the existence of credible information that a specific PTE possesses the training, skills, financial means, and other resources necessary to make or acquire a CBRNE to cause mass casualties. Targeting refers to the existence of credible information that a PTE is preparing for specific terrorist goals against identifiable targets within jurisdiction. References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
U.S. Department of State Bureau of Counterterrorism. (2020). Annex of Statistical Information Country Reports on Terrorism 2019. Development Services Group, Inc. CBS News. (2017, July 5). U.S. Explosive material scare triggers evacuations at Hanscom Air Force base . Retrieved from CBS News: https://www.cbsnews.com/news/hanscom-air- force-base-bomb-squad-massachusetts/ Department of Homeland Security. (2015). Attacks on Federal Government: 2001-2013. Global Terrorism Database. (2023). SEARCH RESULTS: 5128 INCIDENTS . Retrieved from UMD: https://www.start.umd.edu/gtd/search/Results.aspx? chart=weapon&casualties_type=b&casualties_max=&start_yearonly=2015&end_yearonl y=2019&dtp2=all&attack=2,1,3,7,4,5,6,8,9&target=2 Hanscom Air Force Base. (2023). About Us . Retrieved from Hanscom: https://www.hanscom.af.mil/ Homeland Security. (2015). Government Facilities Sector-Specific Plan. https://www.cisa.gov/sites/default/files/2023-03/nipp-ssp-government-facilities-2015- 508.pdf.