Risk Management: Asset Management In order to properly prepare for a terrorist incident at the strategic or tactical level there must be a threat assessment taken for each of an organizations assets. This assessment will ask a few basic questions. What are the capabilities of the terrorist organizations? What type of terrorist attack is most likely to occur against this asset? What can be done to protect against this type of terrorist attack (GAO 2002, p.4)? In order to answer these questions an organization must have a thorough knowledge of the vulnerabilities of the different types of its assets which include fixed, mobile, and personnel. Once the vulnerabilities are determined, steps must be taken to secure the assets focusing on the most critical. Vulnerabilities Determining vulnerabilities relies on an understanding of how and why an asset would be targeted. While in a perfect world with limitless resources an organization would act to prevent every possible threat, resources are limited and need to be focused on the most likely point of attack. Knowing a terrorist organization prefers to use suicide bombers would lead to more space between …show more content…
A rescue truck and rescue qualified personnel are a critical asset for the main mission of a fire house. However, the criticality of these assets would lower during a hazardous material incident. This is due to the mission being outside the abilities of those assets. Some mobile and personnel assets do have symbolic significance. Air Force One is one such asset. While the plane itself has no direct impact on how any one organization functions, if a terrorist attack occurred and took out or damaged the asset there would be an emotional impact felt throughout the entire country and there would be physical reaction throughout the
Security managers apply evaluation techniques to; identify threat assessments, evaluate vulnerabilities, and identify critical assets. Security managers can then mitigate the threat against their facility with countermeasures, to protect facilities, operations, and personnel. The National Counterterrorism Center (NCTC) monitors individuals, groups, and organizations that pose a threat to the U.S. homeland. To be considered a threat, the group must have the capability and intent to carry out an attack. If the IC determines a group or organization has the capability and intent to conduct an attack, they will issue a threat assessment to protect national interests. The security manager needs critical information concerning the date, time, place, and method of a planned attack. “Counterintelligence aids national security by
The U.S. economic downturn also played a major role in our security selections. Due to these recent attacks and the impact they have had upon our system, we will analyze our disaster readiness level, national security index, and budget. A detailed review of our security policies, procedures, rationale, and changes that were in place prior to the attack will be performed. This evaluation of our security decisions will be then be adjusted and reapplied to the control set in order to improve our security and national security index. After reviewing current security procedures, recommendations will be given to maximize the security posture and performance during round three.
International terrorism has greatly impacted the role of first responders throughout the U.S., not only in terms of large scale events like the attacks on 9/11, but the role of the first responder has needed to adapt to the widely varying methods of attacks that have been employed. First responders may face threats from biological, chemical, and radiological weapons of mass destruction. First responder heroes of 9/11 are still dealing with injuries, illness, and even still dying from the effects of that terrorist attack. (ODMP, 2017). First
Vulnerability assessments on terrorism were designed to establish any loopholes in a security system that are prone to harm or attack by a person who may have intentions to harm a particular location, an event or an individual. The main goal of terrorism vulnerability assessments is to establish the weaknesses of facilities across a variety of probable threats. Once such threats are assessed, physical and operational measures of improvement are put in place so as to make sure that such facilities are adequately protected. Such assessments can be administered to a vast range of facilities ranging from existing site management and new construction design over the life of service of such structures. This paper will delve into critical vulnerability assessment of three locations. The first location being Susquehanna Bank Center in Camden City, the Benjamin Franklin Bridge and lastly Corriell Institute for Medical Research.
In this article “How Safer Streets Can Thwart Terrorists” written by Yonah Freemark, educates us about multiple terrorist attacks that have occurred specifically in the New York area and how the state is working to develop a safer approach. In May of 2017 at Times Square a motorist drove through a large crowd killing one person and injuring many others. Had it not been for a three foot guarding rail, the motorist could have killed many more. Another attack like this happened previously where an average of sixteen pedestrians were killed and since then have doubled. New York is not only the victim of these kind of attacks; famous places like France, Netherlands, and London constantly have attacks like these happen.
The United States experienced one of the biggest scaled Domestic Terror Attacks on eleventh September 2001. These assaults against our incredible country were done with the capturing of numerous aircraft transporters. The repercussions of these appalling demonstrations left the aggregate decimation of the World Trade Center, the Pentagon, and other relevant areas. After these occasions the USA Patriot Act of 2001 was passed, and the Department of Homeland Security started to devise and execute the first of numerous missions and conventions to alleviate any further dangers to the United States. Since the sanction of the Patriot Act, there have been various indications of fear based oppressor plots and thwarted assaults against the United States
New technology is being used to detect threat before it strikes. Transportation Safety Agency along the Federal Aviation Administration is working to make air travel more safe, new screeners were hired, and trained to detect potential threat. Security advisory systems are installed at most international airports. Law enforcement officers, federal agents and all employees at areas which may be hit by terrorist attack are introduced to new risk assessment and management procedures. Federal agencies are using modern technology for information gathering and target analysis. All branches of military are trained to fight against the terrorism, because the terrorism is a form of warfare. Department of transportation is performing background check on all truck drivers
To combat these major issues and maintain all critical infrastructure safety, the Government of the United States mandated that risk analysis methods and scenarios be introduced and implemented. Before 9/11, many assets
The assignment being completed within this paper asks the author to answer three general questions. The first asks the author of this paper to create a hypothetical scenario for a terrorist attacked using the Sunni terrorist group picked in Module 1 as the test subject. The second question asks the steps to be taken by both the terrorists to hatch and execute the plan and the mitigating procedures that can be used to negate these measures. Finally, it is asked whether there is any early warning or detection possible for this incident.
After the 9/11 terrorist attacks against the United States, a series of risk management evaluations were created by the US Federal Government to assess the future risks the homeland was going to face. When the Department of Homeland Security (DHS) was officially created in 2002, more effective risk management assessments were re-designed to evaluate the past and present dangers, prevent them and respond successfully to more terrorist attacks. Since 2001 until 2007, a development of risk assessment has been divided in phases to be able to reach a better formula that would analyze the risk within the homeland security and provide the appropriate fund to homeland security enterprise.
Now, they must look and prepare for situations never previously considered. Mass shootings, chemical and nuclear attacks, and suicide bombers are just a few of the possibilities. The reality is that today there are many dangers that have not been previously imagined. The best that can be done is to plan, re-plan and plan again.
Risk management is applied in numerous ways by various agencies and organizations within the U.S. national security apparatus. One manner in which risk management is utilized by the Department of Defense is to mitigate vulnerabilities to personnel during military operations. Whether or not to recruit and deploy a double-agent is a primary focus of risk management within the CIA’s Counterespionage Group. Moreover, evaluating security threats to U.S. embassies and other diplomatic facilities is an application of risk management within the U.S. Department of State. Not surprisingly, risk management is also found throughout the U.S. Department of Homeland Security (DHS). The five primary missions of DHS are: terrorism prevention and security enhancement; border security; immigration law enforcement; cybersecurity; and disaster resiliency (Department of Homeland, 2012, p.2). The concept of risk is inherent to varying degrees in each of these missions. In order to achieve the subordinate goals and objectives associated with each mission, risk management is utilized by DHS to assess subjects such as threats, vulnerabilities, asset criticality, and budgetary matters. Thus, risk management is an essential component in DHS activities such as terrorism prevention, critical infrastructure protection, and resource allocation
Even though we live in a democratic society, we tend to give the government too much power. In the sovereign country that we live in we see selfishness, and discrimination through our government yet, we give them the authority to control us. People give power out of fear and the best believe the government knows that. The government uses propaganda and patriotism to support war effort and big business to make money. Throughout our history there has been deliberately massacre called “Terrorist Attacks” to scare our nation and to gain more money and power. For example, both the 9/11 attack and war are being manipulated by the politicians.
Terrorist groups are becoming or finding ways to become more sophisticated in how they are committing terrorist attacks. With the support of certain countries who support them and let them conduct fundraisers, they have implemented other means such as suicide bombers and lone wolfs. In the recent years, many countries have come to agreements to support each other on the war on terror.
The constant threat of a terrorist attack is something that not only the United States has to worry about when it comes to economic and political conditions but other countries also. Terrorist groups have continued to threaten to harm innocent people or infrastructures at all cost. One way that terrorist can disrupt the United States economy is an attack on a major shipping port and disrupting their operations. This could cripple part of the United States because many of our states depend on the cargo that is brought in and out of our ports. The United States import many different goods from countries around the world. The following is the top imports from Japan alone :