CJ 682 Milestone Two -1
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
682
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
12
Uploaded by CountOctopus1696 on coursehero.com
Threat Assessment: Hanscom Air Force Base
Southern New Hampshire State University
Viktoria Prifti
CJ682: Threat Assessment – Milestone Two
Professor James Henderson
10-22-2023
HAFB
CJ 682 Milestone Two
Vulnerability Identification
Hanscom Air Force Base is guided by the mission of “providing worldwide support for the Air
Force Life Cycle Management Center and outstanding quality-of-life opportunities for our
military personnel, their family members, and the many workers who are part of Team
Hanscom” [ CITATION Han232 \l 1033 ].
Overview of Property
Hanscom Air Force Base is located in the state of Massachusetts. The infrastructure is set
up on a land spanning 846 acres which contains at least 155 buildings. The topmost building is
the medical clinic, which serves the needs of the residents [ CITATION Han232 \l 1033 ].
Likewise, it houses auto skills, force aid, barber shop-exchange, base-exchange, and churches.
Most of the buildings in the area are 731 privatized family housing for current or former military
officers [ CITATION Han232 \l 1033 ]. Also, the base is home to numerous civilians from
divergent backgrounds. It has a surrounding perimeter wall, which is bordered by residential
properties.
Source: [ CITATION Han232 \l 1033 ]
HAFB
CJ 682 Milestone Two
Source: [ CITATION Han232 \l 1033 ]
Operating Elements
The administrative operating element is managed by the Department of Transportation
and Homeland Security. The two agencies work together with the base commander to set up a
robust administrative structure that ensures operational efficiency [ CITATION Han232 \l 1033 ].
The base commander also liaises and collaborates with the Massachusetts Port Authority to
control the flow of civil airlines in the adjacent airport. The current base commander is Colonel
Taona Enriquez, who works with Major General Antony Genatempo to uphold security and
continued operations [ CITATION Han232 \l 1033 ].
The second functional element is the PEO C3I&N, which consists of command, control,
communications, and intelligence and networking systems. The system was set up at the base to
collect information that is shared with combatant commanders [ CITATION Han232 \l 1033 ].
The C3I&N is also responsible for coalition and joint cyberspace, as well as developing
cryptologic algorithms that safeguard military data. It connects various systems across the force
with the intention of sustaining war-winning capabilities.
HAFB
CJ 682 Milestone Two
People
The administrative element contains 5 leaders/executives, as shown in the figure below. Major
General Anthony Genatempo is the executive officer for the C3I&N and is flanked by Scott C.
Hardiman. The latter is the civilian director responsible for the NC3 and program execution.
Likewise, Steven Wert is the program executive officer (PEO) for the base’s life cycle
management center. The base commander (Taona) works together with Chief Master Sergeant
Alan Weary to manage the facility’s operations.
Source: [ CITATION Han232 \l 1033 ]
The C3I&N has a total workforce of 10,306 employees. Out of the total, at least 899 are
active duty service men, with 400 working under the National Guard [ CITATION Han232 \l
1033 ]. Likewise, the LCMC and DOD civilians account for 1,743 and 555 employees compared
to non-DOD and non-appropriated fund civilians at 92 and 170, respectively [ CITATION
Han232 \l 1033 ]. There are 2,208 contractors, with the MIT Lincoln lab having 4058 employees.
Valuable and Critical Assets
The topmost valuable and critical asset at the facility is its cyber systems. These systems
(C3I&N) are responsible for the collection of intelligence information, which is shared with
combatant commanders to ensure decision-making. Subsequently, the Boston Logan
International Airport is critical to its operations with regard to the movement of goods and
people.
HAFB
CJ 682 Milestone Two
Proprietary Information
The cyber technology systems contain proprietary files and data that can be targeted by
terrorists. Specifically, the C3I&N is used to collect intelligence information and protect the
nation’s network infrastructure. It contains data regarding missions and America’s security
posture, which can be detrimental if accessed by the wrong parties. Likewise, the adjacent
civilian airport has computer systems with personally identifiable information. Terrorists might
gain access to the systems and use the information for identity theft purposes in order to gain
entry into Hanscom Air Force base.
Reputation
Hanscom Air Force Base has a positive reputation in the area due to its operations and
security mechanisms. The C3I&N has, however, come under intense scrutiny as it collects
pertinent information about domestic and international operations. The data collection process is
often conducted without consent, which might violate citizen privacy. Nonetheless, the loss of
information can contribute to attacks and damaged organizational reputation.
Protection Justification
Both the C3I&N and Air Force base must be protected because of their two-pronged role
in warfighting and transportation. For instance, any disruptions to the former can contribute to
lost connection and communication between servicemen. The occurrence of an attack on the
latter will ultimately lead to disrupted transportation.
Common Vulnerabilities
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help