Alfred M. Barbe High School**We aren't endorsed by this school
Course
SOCIAL STUDIES CJ682
Subject
Law
Date
Dec 21, 2024
Pages
19
Uploaded by Idontwantaprofile
Introduction and Threat IdentificationThreat Assessment ReportRobin D. Ringo Department of Criminal Justice-SNHUCJ-682-10429-M01 Threat Assessment 2024 D-4Professor WertmanNovember 3, 2024Introduction and Threat Identification
Threat Assessment ReportI. Asset IdentificationName of facilityScott Air Force BaseAddress 901 South DriveCity Scott Air Force Base County Saint Clair CountyState IllinoisCritical infrastructure sector Transportation Systems SectorThe federal agency that is responsible for your sector Department of Defense and Department of Homeland SecurityWhy you chose this asset and how it meets the definition of critical infrastructureI selected Scott Air Force Base due to its proximity to my residence in Missouri. Nevertheless, as I was not born and raised in this area, my knowledge about it is limited. This project presents an excellent opportunity for me to deepen my understanding of the base and its significance. Scott Air Force Base is classified as critical infrastructure because it Acts as the primary liaison for the Department of Defense (DoD) with the travel sector, encompassing contracts with
Travel Management Companies (TMCs), the General Services Administration (GSA) City Pair Program (CPP), and commercial air travel services. This role also includes oversight of airline global distribution systems, commercial travel data, and transportation options such as bus, rail, vessel, and rental car services, as well as the functional requirements of the Defense Travel System (USTRANSCOM,2022). Critical Infrastructure Image(Geological,2008)Sector-Specific Plans: OverviewThe Department of Homeland Security (DHS) and the Department of Transportation (DOT) play crucial roles as the Co-Sector Risk Management Agencies for the Transportation Systems Sector, which is essential for the overall functioning of the nation’s economy and the well-being of its citizens. This sector is vital for ensuring the swift, safe, and secure movement ofpeople and goods, both within the country and across international borders. The Transportation
Systems Sector encompasses a wide range of activities and infrastructure that facilitate mobility and commerce. It consists of seven key subsectors, or modes, each of which contributes uniquelyto the overall transportation network (CISA,2015).Sector-Specific Plans: Vision, Mission, and GoalsThe TSS outlines several key goals: One addresses the security vulnerabilities associated with the physical, human, and cyber components of critical transportation infrastructure. Secondly, utilize the Sector’s capabilities for response, recovery, and coordination to bolster resilience across the entire community. It also establishes mechanisms for efficient collaboration to disseminate mission-critical information among various sectors, jurisdictions, and disciplines, including both public and private entities. Lastly it strengthens the preparedness and resilience ofthe global transportation system against all hazards to protect U.S. national interests (DHS, 2024).The vision of TSS is to establish a transportation system that is both secure and resilient, facilitating the movement of legitimate travelers and goods while minimizing disruptions to commerce, alleviating undue fears of harm, and preserving civil liberties. The goal of TSS is to continuously improve the security and resilience of the Nation's transportation systems, ensuring the safety and protection of both travelers and cargo (DHS, 2024).Sector-Specific Plans: RiskCritical transportation infrastructure faces various risks, including natural disasters and both physical and cyber threats of human origin. Natural disasters encompass events such as hurricanes and tornadoes that may impact air and maritime travel. In contrast, man made threats
involve acts of terrorism, vandalism, theft, technological malfunctions, and accidents. The increasing dependence on cyber-based systems for control, navigation, tracking, positioning, andcommunication raises significant concerns regarding cyber threats. Malicious actors can easily exploit vulnerabilities within the cyber systems that support the Department of Transportation Infrastructure Sector (DHS, 2024).Sector-Specific Plans: Key Sector AssetsThe Department of Homeland Security (DHS) acknowledges the critical importance of a diverse range of assets that are integral to the Transportation Infrastructure Sector and its various subsectors. Each of these subsectors plays a vital role in ensuring the smooth functioning of transportation systems across the nation, contributing to economic stability, public safety, and national security (DHS,2024). In the aviation subsector, a comprehensive array of assets is recognized, including not only airports and heliports but also military air bases and air support services that facilitate both civilian and military operations. Furthermore, sophisticated systems for air traffic control and navigation are essential for maintaining the safety and efficiency of air travel, ensuring that aircraft can operate seamlessly in increasingly crowded airspace (DHS,2024).Turning to the marine sector, the DHS report from 2015 highlights the significance of various assets that support maritime transportation. This includes extensive networks of waterways that enable the movement of goods and people, as well as strategically located ports that serve as critical hubs for international trade. Intermodal land connections are also vital, as they facilitate the transfer of cargo between different modes of transportation, enhancing the overall efficiency of the supply chain (DHS,2024).
The freight rail subsector is characterized by a robust infrastructure that includes rail lines, which are essential for transporting bulk goods over long distances. Freight vehicles, such as boxcars and tankers, are integral to this subsector, as are the railroad systems that manage the operations and logistics of freight transport. This network is crucial for supporting industries thatrely on rail for the movement of raw materials and finished products (DHS,2024). In the highway and motor carrier subsector, a wide range of assets is identified, includingextensive networks of highways that connect cities and regions, as well as bridges and tunnels that facilitate the movement of vehicles across geographical barriers. Trucks and freight vehicles are the backbone of this subsector, enabling the delivery of goods directly to consumers and businesses. Additionally, buses and coaches provide essential public transportation services, while intermodal facilities serve as key points for transferring cargo between different transportation modes (DHS,2024). The pipeline subsector is another critical component of the transportation infrastructure, featuring assets such as natural gas pipelines that transport energy resources across vast distances. Pipelines designed for hazardous liquids, gas, and petroleum are also included, highlighting the importance of safe and efficient transport of these materials, which are vital to the economy and energy security (DHS,2024).Moreover, the postal and shipping subsector encompasses a variety of services that are essential for communication and commerce. Major carriers, local courier services, and mail services play a significant role in ensuring that packages and correspondence are delivered promptly (DHS,2024).Sector-Specific Plans: Critical Infrastructure Partners
Individuals from both public and private sectors responsible for protecting assets, systems, and networks within the industry are regarded as collaborators. This collaborative approach is essential for ensuring the security and resilience of critical infrastructure, which is a shared responsibility among various levels of government and organizations (DHS, 2024). This responsibility extends to Federal, State, Local, Tribal, and Territorial Governments (SLTT) and international governments. Additionally, the proprietors and operators of these systems, along with regional organizations and coalitions, play a vital role in safeguarding these infrastructures (DHS, 2024). Key community stakeholders involved in this collaborative effort encompass a diverse range of entities. Higher education institutions contribute valuable research and training resources, while professional organizations at both national and international levels provide expertise and best practices. Nonprofit labor representation groups advocate for the rights and safety of workers within the sector, and volunteer organizations often assist in emergency response and community resilience initiatives. The public also plays a crucial role, as their awareness and engagement can significantly enhance the overall security posture of the infrastructure (DHS, 2024).II. Threat IdentificationData Gathering: Groups, Weapons, and TargetsThe analysis of the Maritime Subsector, the Transportation Systems Sector, and a specificfocus on the Scott AFB was conducted utilizing comprehensive data sourced from the Global Terrorism Database. This in-depth examination aims to shed light on the dynamics of terrorism as it relates to maritime operations and transportation systems, particularly in the context of the
Scott AFB. The analysis encompasses a thorough investigation of various terrorist organizations,their modus operandi, the nature of their attacks, the entities they target, and the types of weaponry employed in these incidents (Global,2022). In total, twenty-five distinct terrorist incidents have been recorded within the Transportation Sector across eight nations globally. The nations affected by these incidents include Afghanistan, Colombia, France, Iraq, Mexico, Pakistan, Thailand, and the United States. Each of these countries has experienced a range of attacks that highlight the vulnerabilities within their transportation systems, particularly in maritime contexts (Global,2022).The nature of these attacks varied significantly, encompassing a spectrum of violent actions such as armed assaults, bombings and explosions, assaults on facility infrastructure, hijackings, hostage situations, and unarmed assaults. This diversity in attack types underscores the multifaceted threats faced by transportation systems and maritime operations. The geographical distribution of these port-related attacks spans several regions, including the MiddleEast, North America, South America, South Asia, Southeast Asia, and Western Europe, culminating in a total of 25 recorded incidents (Global,2022). The targets of these attacks were equally varied, reflecting the broad spectrum of entities that terrorists may seek to disrupt or destroy. These targets included businesses operating within the maritime sector, government entities responsible for transportation oversight, maritime operations themselves, military installations that may be strategically significant, private individuals who may be perceived as vulnerable, transportation systems that facilitate commerce and travel, and utility services that support the infrastructure of these operations (Global,2022).
The perpetrators of these attacks comprised a range of groups, each with its own ideological motivations and operational capabilities. Notable among these groups are the Clandestini Corsi, the National Liberation Army of Colombia (ELN), the Revolutionary Armed Forces of Colombia (FARC), various Anarchist factions, and the Taliban. Each of these organizations has employed different tactics and strategies to achieve their objectives, contributing to the complexity of the threat landscape (Global,2022). The resulting casualties from these incidents have been significant, with 21 fatalities and 40 injuries reported. This toll highlights the human cost of terrorism within the transportation sector and underscores the urgent need for enhanced security measures and counter-terrorism strategies to protect critical infrastructure, such as the Scott AFB (Global,2022).Google search for Historical Attacks/Significant Crimes Against my Sector/TargetOn the morning of September 11, 2001, the world witnessed a tragic and unprecedentedseries of coordinated terrorist attacks that unfolded across the United States. These attacks targeted iconic landmarks, including the Twin Towers of the World Trade Center in New York City, as well as the Pentagon in Virginia and a thwarted attempt in Pennsylvania (National,2004). The catastrophic events of that day resulted in the loss of 3,000 innocent lives, leaving an indelible mark on the nation and the world. The attacks were executed using commercial aircraft, which were hijacked by terrorists and turned into deadly weapons, leading to widespread devastation and a profound sense of vulnerability (National,2004).One of the most heartening outcomes of a marine time transportation operation was the rescue of five victims of human trafficking, who were being held captive on a vessel near Taganak Island in the Philippines. This rescue operation highlighted the critical need for
vigilance and action against human trafficking, a heinous crime that often goes unnoticed but affects countless individuals worldwide. The successful rescue of these victims served as a reminder of the importance of international cooperation in addressing not only terrorism but also the broader spectrum of transnational crimes that exploit vulnerable populations (Multi-Agency,2023). in addition to the arrests, fourteen vessels engaged in illegal fishing activities were seized, demonstrating a proactive approach to enforcing maritime laws and protecting marine resources. Furthermore, the operation yielded meaningful results in the fight against drug trafficking, with suspects connected to three separate drug trafficking operations being apprehended. This multifaceted approach not only targeted the immediate threats posed by these criminal activities but also aimed to dismantle the networks that facilitate them (Multi-Agency,2023). As a result of this effective collaboration, several significant arrests and seizures were executed. Authorities successfully confiscated three tons of protected marine species, highlighting the ongoing battle against illegal fishing practices that threaten biodiversity and marine ecosystems. The operation led to the apprehension of eighteen individuals who were linked to a range of transnational crimes, including drug trafficking, smuggling, and illegal fishing activities. These arrests underscored the multifaceted nature of crime that transcends borders and the importance of international cooperation in addressing these challenges (Multi-Agency,2023).A review of Google search results indicates that Scott AFB has not experienced any notable crimes or attacks.
Google Search Annual Crime RateBased on an analysis of FBI crime statistics conducted by Neighborhood Scout, Scott Air Force Base exhibits a safety level that surpasses 84% of cities and towns across the United States, regardless of population size. Within the state of Illinois, merely about 24% of communities report a crime rate that is lower than that of Scott Air Force Base. Residents of Scott Air Force Base face a likelihood of becoming crime victims of 1 in 307, in contrast to the national average, which stands at 1 in 43 across all communities, from the largest to the smallest (Neighborhood, 2024).The analysis conducted by Neighborhood Scout indicates that Scott Air Force Base experiences a violent crime rate significantly lower than the national average across various communities, regardless of their population size. Incidents of violent crimes, including assault, rape, murder, and armed robbery, occur less frequently in Scott Air Force Base compared to most locations in the United States. The likelihood of an individual becoming a victim of a violent crime in this area is approximately one in 1,844, translating to a violent crime rate of 1 per 1,000 residents (Neighborhood, 2024). Furthermore, Neighborhood Scout's examination of property crime demonstrates that the property crime rate in Scott Air Force Base is also below the national average for cities and towns. This suggests that residents are less susceptible to crimes such as arson, motor vehicle theft, larceny, or burglary in this locale than in most American communities. The probability of experiencing property crime while residing in Scott Air Force Base is merely one in 369 (Neighborhood, 2024).Google Search of Domestic Terrorist Against My Sector
The hijacking of Southern Airways Flight 49 began on November 10, 1972, in Birmingham, Alabama, and unfolded over an intense and harrowing duration of 30 hours. This dramatic incident spanned three countries and covered an extensive distance of approximately 4,000 miles, concluding the following evening in Havana, Cuba. The American hijackers MelvinCale, Louis Moore, and Henry D. Jackson Jr. One of the men was from Detroit, while two of the men were from Oak Ridge and they successfully took control of a Southern Airways Douglas DC-9 that was making its way from Memphis, Tennessee, to Miami, Florida (Derner,2011).At the time of the hijacking, the three men were not just ordinary passengers; they were facing their own legal troubles, each dealing with separate criminal charges that added a layer of desperation to their actions. The aircraft carried thirty-five individuals, including thirty-one passengers and four crew members, all of whom were caught in a terrifying situation as the hijackers executed their plan (Derner, 2011).The hijackers employed a particularly alarming tactic to assert control over the aircraft: they threatened to crash the plane into a nuclear reactor. This chilling threat not only instilled fear in the hearts of those on board but also had far-reaching implications for airline security protocols in the United States (Derner,2011). In response to this incident and the growing concern over airline safety, the federal government took decisive action. As a direct result of the hijacking, mandatory physical screening for all U.S. airline passengers was implemented, with the new regulations taking effect on January 5, 1973. This marked a significant turning point in aviation security, as authorities recognized the urgent need to enhance safety measures to preventsimilar incidents in the future (Derner,2011).Interpret and include related graphs related to tactics, weapons, and victims.
Among all groups affiliated with al-Qa’ida, the predominant tactics utilized included shootings, which accounted for 50 percent of incidents, followed by bombings and improvised explosive device (IED) attacks, each representing 22 percent of the total (State,2021).In 2021, 29 percent of incidents linked to al-Qa’ida were directed at military targets. Additionally, the general populace constituted 24 percent of the victims of al-Qa’ida-related violence, while law enforcement agencies accounted for 10 percent of the incidents. Reports
indicated that al-Qa’ida-affiliated terrorists were killed in 26 percent of the incidents attributed totheir activities during the same year (State,2021).A Web Search for Cyberattacks Against Transportation SectorA recent report from the Metropolitan Transportation Authority (MTA) has brought to light a concerning incident that occurred in April, where cybercriminals, believed to have ties to China, successfully infiltrated the computer systems of the New York transportation agency. This breach raises significant questions about the security measures in place to protect critical infrastructure, especially ones that are vital to the daily commute of millions of residents and visitors in the city (Niekerk,2018).In response to the incident, officials from the MTA have been quick to reassure the public that, despite the breach, there was no immediate threat to passenger safety. This statement aims to alleviate concerns among commuters who rely on the agency's services for their daily travel needs. However, the report highlights that the cyberattack exposed significant vulnerabilities within the transportation network, which could potentially be exploited in the future (Niekerk,2018).The MTA operates one of the largest and most complex transportation systems in the world, serving millions of individuals each day through its subway, bus, and commuter rail services. The implications of such a cyber breach are far-reaching, as it not only jeopardizes the integrity of the agency's operations but also raises alarms about the potential for more severe attacks that could disrupt services or compromise sensitive data (Niekerk,2018).
As the investigation into the breach continues, it is crucial for the MTA and other transportation agencies to reassess their cybersecurity protocols and implement stronger defensesto protect against future threats. This incident serves as a stark reminder of the increasing sophistication of cybercriminals and the need for robust security measures in an era where technology plays an integral role in public transportation systems. The MTA's commitment to addressing these vulnerabilities will be essential in maintaining public trust and ensuring the safety and reliability of its services moving forward (Niekerk,2018). History of terrorist attacks by a terrorist group: Related to my sectorAl-Qaeda attacks targeting airliners and airports represented a sizable portion of terrorist activities during the late 1960s and early 1970s, necessitating the implementation of exceptional security protocols. Although there have been advancements in curtailing the frequency of hijackings and acts of sabotage against aircraft, threats to commercial aviation persisted. The September 11 attacks, which resulted in 3,000 fatalities, along with subsequent suicide bombing attempts on airliners, led to the introduction of even more rigorous measures aimed at preventingthe introduction of weapons and explosives onto aircraft (Jenkins,2015). By the year 2020, incidents of terrorist hijackings had been eradicated, although concernsregarding sabotage remained. Concurrently, there was a notable rise in terrorist assaults on public surface transportation throughout the 2010s. The attacks of the early 1970s were primarilyintended to instill fear and create disruption. For subsequent generations of terrorists, trains and buses presented easily accessible targets with large groups of individuals in confined spaces, shifting the objective towards mass casualties, as evidenced by the bombings of commuter trains in Madrid in 2004, London in 2005, and Mumbai in 2006 (Jenkins,2015).
The security framework established for aviation could not be effectively transferred to surface transportation due to the overwhelming number of passengers; implementing screening procedures would necessitate a vast workforce of screeners. Such delays and expenses would undermine the viability of public transport. Consequently, rather than setting up security checkpoints, transportation operators needed to explore strategies to minimize casualties through the design of stations and vehicles, rapid response measures, and engaging passengers in the identification of suspicious activities and items (Jenkins,2015).Overview of Al-Qaeda to my SectorForeign terrorist organizations, including Al-Qaeda and ISIS, are actively working to reestablish their influence and operational capabilities across various regions of the globe. These groups are bolstered by extensive and sophisticated global networks that pose significant threats to the security of the Homeland. Among state actors, Iran is expected to remain the leading sponsor of terrorism, consistently engaging in activities aimed at targeting individuals within the United States (DHS,2024).These foreign terrorist entities are adept at utilizing online platforms to connect with theirsupporters, seeking not only financial contributions but also disseminating propaganda and inciting violence. Their affiliates, particularly in regions such as Africa, Asia, and the Middle East, are primarily focused on local objectives, yet their actions can have far-reaching implications that extend to Western nations (DHS,2024).In the wake of the U.S. withdrawal from Afghanistan, ISIS’s regional affiliate, known as ISIS-Khorasan, has gained increased prominence. This group has been responsible for a series ofhigh-casualty attacks abroad and has produced English-language media designed to resonate
with Western audiences, effectively highlighting their local grievances and justifying their violent actions (DHS,2024). Moreover, individuals associated with terrorist activities are actively exploring established travel routes and identifying favorable environments that could facilitate their entry into the United States. Iran, in particular, remains steadfast in its commitment to orchestrating attacks against current and former U.S. government officials. This is viewed as a form of retribution for the 2020 assassination of Qassem Soleimani, the commander of the Islamic Revolutionary Guards Corps-Qods Force (IRGC-QF), who was designated as a foreign terrorist (DHS,2024).The Iranian regime has been known to employ individuals who already have access to theU.S. for the purposes of surveillance and planning lethal operations. This strategy often involves utilizing dual nationals, members of criminal organizations, and private investigators. Notably, Iran has executed plots that do not require operatives to travel internationally, thereby reducing the risk of detection (DHS,2024). In August 2022, the Department of Justice took significant action by indicting a member of the IRGC-QF for allegedly conspiring to assassinate a former U.S. National Security Advisor. This incident underscores the ongoing threat posed by Iran and its affiliates. Additionally, Iran's proxy group, Lebanese Hizballah, has publicly called for vengeance against the United States in response to Soleimani’s death, further illustrating the persistent and evolving nature of the threatsposed by these foreign terrorist organizations and state sponsors of terrorism (DHS,2024).Does Al-Qaeda exist or operate within your area
As of now, there is no evidence to suggest that al-Qaeda is actively operating in the St. Louis and eastern Illinois region. This assessment is based on current intelligence and law enforcement reports, which indicate that while the group has a global presence and has been involved in various terrorist activities around the world, its direct influence and operational capacity in this specific area appear to be minimal (Jones et al.,2020). Local authorities and federal agencies continue to monitor potential threats, but there have been no significant indications of al-Qaeda's involvement in any plots or activities within this geographic region. It is important for communities to remain vigilant and report any suspicious activities, but currently, the threat level from al-Qaeda in St. Louis and eastern Illinois is considered low (Joneset al.,2020).References
Cybersecurity and Infrastructure Security Agency (CISA) 2015.Transportation Systems Sector-Specific Plan Department of Homeland Security (DHS). 2024.Homeland Threat Assessment Derner, Phil. 2011. On this Day in Aviation History: November 10thGlobal Terrorism Database. (2022). Global Terrorism Database. University of Maryland.Jenkins, Brian Michael.2015 The Terrorist Threat to Transportation Targets and Preventive MeasuresJones Seth, Doxsee Catrina and Harrington, Nicholas. 2020. The Escalating Terrorism Problem in the United StatesMulti-Agency Exercise Targets Maritime Crime in Southeast Asia. (2023)National Commission.2004. National Commission Upon Terrorist Attacks in the United States.Neighborhood Scout, 2024. Scott Air Force Base Crime RatesNiekerk, Brett. 2018.Analysis of Cyber-Attacks Against the Transportation Sector Scott Air Force Base-VirtualBulletin March 2021United States Geological Survey 2008. Scott AFUnited States Transportation Command (USTRANSCOM) 2022. Who are we and what do we do?Transportation Systems Sector-Specific Plan - 2015