While specific intelligence of a looming attack would be ideal, when it comes to calculating a vulnerability assessment, we are more likely to be forced to assume risks and weigh those risks amongst many factors. Every student should understand the procedures involved in determining an overall likelihood score of a terrorist attack utilizing the Threat and Vulnerability Assessment. This paper will cover the assets with the highest likelihood scores, as well as those with the lowest scores. Additionally, it will cover the methods in which these scores were obtained and whether I agree with the final outcome, including any biases I may have observed. The locations I determined to have the highest likelihood score assessment value in Jacksonville were: Interstate I-95 Bridge over the St. Johns River with a likelihood score of 5; Water treatment facility with a likelihood score of 4; and Alltel Stadium with a likelihood score of 4. For Miami Dade: Interstate I-395 Bridge over Biscayne Bay with a likelihood score of 5; Miami International Airport with a likelihood score of 5; and …show more content…
U.S. Southern Command Headquarters with a likelihood score of 4. For Tampa: Interstate I-275 Bridge over Tampa Bay with a likelihood score of 5; and finally, Sunshine Skyway Bridge I-275 with a likelihood score of 5. The locations I determined to have the lowest consequence assessment value in Jacksonville were: Naval Air Station Jacksonville with a likelihood score of 1; Jacksonville Port Authority with a likelihood score of 2. In Miami Dade: Port of Miami with a likelihood score of 1; Dolphin Stadium with a likelihood score of 2. In Tampa: U.S. Central Command Headquarters with a likelihood score of 2; and Salvador Dali Art Museum with a likelihood score of 2. 3 I came to these values in large part after reading the Joint Terrorism Task Force intelligence Reports (JTTF) for each geographical area (Saint Leo University, 2016). Threat scores were directly attributed to actions or “chatter” obtained from each report. As an example, in the Tampa JTTF report (2016), “intercept information suggests that Al Qaida has been making plans to target the Tampa Bay area due to its symbolic association with the United States Central Command”. Indicators like this, allow us to elevate the threat score because there is a specific threat known. Obtaining a Vulnerability score was a task I was able to complete using the “site summary reports” (Saint Leo University, 2016). For example, I elevated the vulnerability score for the water treatment plant in Jacksonville due to the fact that, ID checks are relaxed, and visitors are able to freely roam the location. While I certainly agree with the methods I used to determine the likelihood values, I am quite astonished by the locations that received the highest likelihood scores.
Four of the eight highest scores were given to Interstate/Bridge locations; conversely, these areas did not that score nearly as high on the consequence assessments. Clearly, there is a bias in my scoring methods when it relates to these Interstate roadways and bridges. Essentially, they all scored fairly high since I consistently graded their vulnerability extremely elevated. In contrast to nearly every other location, there simply are no protocols in place to restrict access to these assets. Additionally, as public roadways, I can’t imagine any means of protecting these roadways/bridges. In all honestly, preemptive actions may very well be the only option when it comes to protecting them against a terrorist
attack. This paper covered the assets with the highest likelihood scores, as well as those with the lowest scores. Additionally, it covered the methods in which these scores were obtained and 4 whether I agreed with the final outcome, including any biases I observed. Every student should understand the procedures involved in determining an overall likelihood score of a terrorist attack utilizing the Threat and Vulnerability Assessment. Yes, proactive actions against terror attacks are often cumbersome and contrary to public ease. In the words of John F. Kennedy “There are risks and costs to action, but they are far less than the long range risks of comfortable inaction (Kennedy, 2018).
Steven Hermosillo Professor Wallace Fire Tech 105 15 November 2015 Silver Bridge Collapse According to Wikipedia, Forty-six people were killed in the silver-bridge collapse and another nine people were injured. “The Silver Bridge was an eye-bar-chain suspension bridge built in 1928 and named for the color of its aluminum paint. The bridge connected Point Pleasant, West Virginia, and Gallipolis, Ohio, over the Ohio River” (Wikipedia). This was a highly used bridge serving thousands of cars a day before the collapse.
The terrorist attacks on September 11, 2011 prompted the world to reevaluate and drastically modify airport and airline security. “Four targets had been chosen, all iconic American buildings that would send a clear message of the depth of their hatred for the United States. All four planes crashed, killing all on board—terrorists, crew members, and passengers, along with hundreds who were killed inside the structures, on the ground, and the men and women who ran into collapsing buildings in an effort to try and save others” (Smutz 1). As Jason Villemez said “the decade after the 9/11 attacks reshaped many facets of life in America” (Villemez 1). Before the attacks, people did not think that large scale hostility towards innocent people in our country was remotely possible. Ever since that fateful moment, citizens in America are on their toes every day worrying about another attack happening. United States citizens have had to adapt and change in response to this fear of further terrorist assault on our country. One of the ways they have adapted is by changing their means of security concerning airline travel.
This assignment looks at the importance of safeguarding and how practitioners and agencies should be involved to help prevent any risks when dealing with a vulnerable adult. The case study is about a 22 year old vulnerable adult called Andrew who has been diagnosed with autism. According to (Autism.org.uk, 2017) Autism is a complex developmental disability that usually affects children during early childhood. It is a condition that can affect communication, behavior, social interactions and how people experience and interact in the general word around them.
Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/268/540 White, J. R. (2014). Terrorism and homeland security (8th ed.). Belmont, CA: Wadsworth.
After the Cold War Americans feared nuclear attacks resulting in the development of the interstate highway system. The highway was built for nuclear attack emergency precautions.
Hargreaves, Steve. "The High Cost of America's Bad Roads and Bridges." CNNMoney. Cable News Network, 12 Feb. 2013. Web. 15 Mar. 2014.
Many mass construction projects in the history of the United States have had a major impact on the economy and culture; however, not many of these have had as large as an impact as the Interstate Highway Act of 1956. The Interstate Highway Act revolutionized the way that we think about highways today. The act created an extremely easy mode of transportation for people across the country. Not only was the Interstate Highway Act extremely helpful in making rural and urban transportation for normal people, but it also helped commercial businesses in increasing sales across the country. These businesses were now able to transport their goods cheaper and faster. The Interstate Highway Act was tremendously beneficial in regards to its economic, social, and cultural significance. The legislation was significant economically in the way that it promoted business and cut travel costs, it was significant socially in the way that it allowed people to see friends and family even if they did not live close, and it was significant culturally in the way that it allowed people to move out to the country for low costs in order to live a happier life.
Throughout its nearly 60 year history, the Interstate Highway System has served the United States of America far beyond its original goals. From its original purposes of uniting the country and aiding defense to the more mundane, (but equally important)such as ferrying goods across the country, the Interstate Highway System has firmly entrenched itself as one of the greatest feats of engineering the world has ever known. Record setting bridges, tunnels, and length of pavement have all been made by the vast expanse of the IHS FACT. As Dwight D. Eisenhower, then president, stated “Together, the united forces of our communication and transportation systems are dynamic elements in the very name we bear -- United States. Without them, we would be a mere alliance of many separate parts” (http://todayinsci.com/Events/Transport/HighwayInterstate-Quotations.htm 22 Feb 1955)
The United States has endured numerous security breaches and high security threats over the past two decades. After the attacks on 9/11, the office of Intelligence became a vital source in retrieving sensitive data and tracking down potential terrorists and their networks which could pose a threat to the American people and then forwarding that vital information to the Department of Homeland Security and other government agencies. Intelligence became a key role in “assessing threats to critical American infrastructures, bio-and nuclear terrorism, pandemic diseases, threats to the borders to the nation, and radicalization within American society” (Randol, 2009, p. 7). The sharing of homeland security intelligence has become a precedence for Congress and the government. Our nation must be one step ahead of any potential terrorists that want to harm our turf. Within this text the capabilities and limitations of both domestic and foreign intelligence in supporting homeland security efforts will be explained;
The events of 9/11 brought out the issue of attack prevention and the transformation of America’s intelligence community. These technology adva...
Founded by the Monterey Group (Terrorism Committee for the U.S. Legislature), the United States adopted a three-level categorization for cyber-terror including simple-unstructured, advanced-structures, and complex-coordinated (Findlay, 2014). At the first level of cyber-terror is a simple unstructured attack. Under this category, a simple-unstructured attack involves very diminutive target analysis, command and control, or learning skills. This type of attack is normally planned within a matter of months and targets a general organization. Next is the level of an advanced-structured attack, which requires a straightforward target analysis, command and control, learning skills, and a high amount of planning in order to cause extensive damage. For example, in 2007, there was a three-week period of cyber-attacks on Estonia (located in Northern Europe), which targeted the country’s government, financial, and security divisions. Due to the extensive planning of this sophisticated attack, Estonia’s government was thrown into chaos and was unable to operate at full capacity. Finally, at the last level of cyber terrorism is the complex-coordinated attack (Extremely rare). At the highest level of terror, these attacks require substantial time, specialized skills, resources, and a highly capable target analysis. One of these substantially rare attacks
There is a lot of complexity in understanding risk management and its correlation to homeland security. Risk management is a way to approach the fact that securing the homeland is not certain and there are unknown variables in every aspect of life; risk management is a way to narrow down the focus based on quantifiable information determining probability against capability. Risk management plays and integral role in homeland security. Risk management is employed using a formula described in the NIPP for establishing a narrow scope to make the best decision about protecting infrastructure. The risk management formula lays down the foundation to make the most reasonable determination based on the potential consequences, vulnerability, and
Michael D. Greenberg, Peter Chalk, Henry H. Willis, Ivan Khilko, Davis S. Ortiz, “Maritime Terrorism: Risk and Liability,” (Santa Monica, CA: RAND Corporation, 2006)
Unequivocally speaking, the threat of a cyber-attack has become one of the most critical domestic and national security challenges we face as a nation today. Infrastructures supporting government operations are ...
“We deliver fact-based, actionable solutions grounded in rigorous analysis” (About, 2016). The Transportation Security Administration (TSA) and Boeing developed a terrorism risk modeling tool in which the RAND organization helped evaluate. “The Risk Management Analysis Tool, or RMAT, simulates terrorist behavior and success in attacking vulnerabilities in the domestic commercial air transportation system, drawing on estimates of terrorist resources, capabilities, preferences, decision processes, intelligence collection, and operational planning” (Aviation, 2012). The RMAT is an important tool in simulating many different attacks and describing just how well the layers of aviation security are likely to perform. It produces particular data allowing analyst to understand the possible damage produced by the different attacks and calculates expected losses and