Professional Documents
Culture Documents
Threat Assessment
Introduction
Threat assessment, a structured group process used to evaluate the risk posed by a threat
2015). The threat assessment of the critical infrastructure of Logan International Airport provides
identification and assessment, consequences and criticality, and finalized with countermeasures
and recommendations. This project is directed at collecting and developing information that
leads to a successful assessment of all assets within Logan International Airport and the focus on
analyzing different threat actors and potential consequences; while providing detailed
Table of Contents
1) Title Page………… Page 1
Executive Summary
Attached
5
Threat Assessment
I. Asset Identification
Name: Logan International Airport (BOS)
Address: 1 Harborside Drive
City: Boston
County: Suffolk County
State: Massachusetts
Sector: Transportation Systems Sector
Agency Responsible: U.S Department of
Transportation
BOS Overview:
Logan International Airport (BOS), lies within the Transportation Systems Subsector of
Aviation. BOS is the primary airport that serves new England and operates within four passenger
terminals; terminals A, B, C, and E. These four terminals are self-contained with 94 gates that
physical or virtual, so vital to the United States that the incapacity or destruction of such systems
and assets would have a debilitating impact on security, national economic security, national
public health or safety, or any combination of those matters” (DHS, 2017). BOS meets this
standard and considered a critical infrastructure due to its mass-liability of international and
6
Threat Assessment
domestic travel; being responsible for the safeguarding of American citizens and the
incapacitation of this infrastructure would potentially cause an imminent threat to the physical
and economic security of the United States and its people. (McLamb, 2017, p.2)
critical infrastructures whose networks, assets, and systems, are considered so vital and
important to the United States that their potential incapacitation would have a debilitating effect
on security, national economy, and national public health (DHS, 2017). The Transportation
Systems Sector consists of 7 subsectors or modes; these modes are Aviation, Highway and
Motor Carrier, Maritime Transportation Systems, Mass Transit and Passenger Rail, Pipeline
Systems, Freight Rail, and Postal and Shipping. Within the Transportation Systems Sector-
Specific Plan in 2015, the Department of Transportation lays out four specific goals. These goals
are to include:
(1) Manage the security risks to the physical, human, and cyber elements of critical
stakeholders, and (4) Enhance the all-hazards preparedness and resilience of the
While these may be the goals of the sector-specific plan, the mission:
“is to provide a secure and resilient transportation system, enabling legitimate travelers and
goods to move without significant disruption of commerce, undue fear of harm, or loss of civil
While maintaining their focus of the organizations mission to continuously improve the
security and resilience posture of the Nation’s transportation systems in order to ensure the safety
and security of travelers and goods (USDOT, 2015). This sector has specific risks that may affect
its overall infrastructure such as natural disasters, manmade and physical threats as terrorism,
1. Natural disasters are to include (1) global climate change, (2) earthquakes, (3)
wildfires, (4) flooding, (5) blizzards, (6) hurricanes, (7) tornadoes, and (8) droughts
2. Terrorism can pertain to physical or cyber-attacks that can significantly disrupt vital
(USDOT, 2015)
to its advanced aging and deterioration. This deteriorating infrastructure threatens the
resilience of the transportation systems and can enhance the risks by other natural
transportation sector include individuals, groups, and any organization that have
8
Threat Assessment
direct responsibility for the safety and security of the airports assets, systems, and
networks.
Key partners associated with Logan International Airport are but not limited to:
Much like associated partners, Sector Assets are but not limited to:
transportation aviation-sector. These attempts have been directly affiliated with the following
terror organizations;
I. Al-Qaeda
II. Anti-Israeli Extremists
III. Al-Qaeda in the Arabian Peninsula (AQAP)
IV. Other (unknown affiliations)
While the attacks have been conducted by many different means of weaponry such as:
I. Chemical (1)
II. Explosives (2)
III. Firearms (3)
IV. Incendiary (5)
V. Melee (6)
VI. Vehicles (4)
With designated targets of:
I. Airports and Aircraft
II. Military Airports
III. Private Airports/Citizens
information and attacks have been limited to none. However, there has been a recent attack
involving a tax-driver striking a crowd of people and information leading government officials to
10
Threat Assessment
believe potential terrorist affiliated travelers conducting travel through Logan International
Airport. An example of this would be the terrorists that used Logan International Airport during
While Al-Qaeda and ISIL pose immediate threats to the United States, these two Islamic
terror organizations pose the greatest overall threat to the transportation-systems sector;
especially Logan International Airport. The increase of homegrown radicalized Americans and
the increase of travel from those radicalized Americans to the MENA and Middle East regions
have vastly increased the current domestic threat as they have easy access to and from the United
States.
When it comes to what drives Islamic terror organizations, there are many different
variables. These motivations can be sought towards (1) religious, (2) military, (3) personal, and
(4) political. Groups such as Al-Qaeda and ISIL have massive capabilities regarding
international travel and military-style leaders, tactics, and training. Through world-wide
radicalization and the distribution of online propaganda, Al-Qaeda, ISIL, and many different
terror organizations can recruit soldiers from all around the world who have different
Within Logan International Airport, there are four terminals; terminals A, B, C, and E. Within
these terminals, the airport contains other key assets that aid in the airports functionality and
responsible for connecting flights through over fifty different airline services. This airport serves
as New England’s primary source for domestic and international travel by providing more than
13
Threat Assessment
33.5 million passengers with services to and from the United States (MASSPORT, 2017).
Logan International Airport is located within East Boston, Massachusetts. East Boston
contains approximately 40,000 residents. Logan borders Winthrop, Revere, and Chelsea Creek.
Across the harbor from Logan airport sits Boston’s financial district; being connected through
various services of ground transportation. Within a two-mile radius of the airport lies critical
services sector, financial services sector, government facilities sector, healthcare and public
health sector, and other subsectors within the transportation systems sector.
The networking operations within Logan International Airport is a key asset to the
functionality and success of the airport. Key assets pertaining to the functional operating
elements are the employees, organizational administration, TSA and security forces, airline pilots
and crew members, internal and external stakeholders, customers, and passengers. Each variable
must be identified and considered within the vulnerability identification process that leads to the
Logan International Airport provides services to millions of passengers a year, each day is
critically analyzed and recorded. In August of 2017, and the most recent statistics provided by
MassPort, the stastics pertaining to flights, passengers, and cargo & mail are as follows:
Logan International Airport; in addition to the already 16,000 employees working within the
valuable assets is important. Logan International Airport, being the primary source for domestic
and international travel within New England, the most valuable assets within the infrastructure
are the passengers, airlines, terminals, and runways. Without these important assets, or if a threat
actor was to incapacitate these assets, it would be detrimental to the local and nation’s economy.
Large amounts of proprietary information may also be accessed by a foreign entity during a
cyber-attack or general “hacking”. This type of information may potentially lead to the discovery
and theft of passenger information, personal information, tacking and networking information of
their size, territorial power, and capabilities since their original discovery and beginning in 1999.
The Islamic terror groups motivations and tactics are to cause mass casualty throughout the
world and spread their violent ideologies and beliefs. While Logan International Airport is
located near a business district and has thousands of people going through its doors every day,
this infrastructure contains the perfect opportunity for a group such as ISIL to commit a violent
attack. Not only does Logan airport contain key assets that a terror group looks for when
States, it is important to identify the key locations where Logan International Airport provides
transportation to within the MENA and Middle East regions. Providing international travel to
and from these locations put the airport at a large risk and poses a great threat for those affiliated
with terrorist organizations to use the airport for travel purposes. (McLamb, 2017, 5-6)
The vulnerability level of the aviation sector would be placed at a risk level of “8”. This
meaning the critical infrastructures subsector of the aviation mode is placed at a risk level of
“High”. This risk assessment is justified based off of the international capabilities and
clandestine travel by the terror group, ISIL. In determining this rating, all assets and
vulnerabilities of those assets must be analyzed thoroughly in order to determine which key asset
poses the greatest threat. Providing international travel to and from the United States while
17
Threat Assessment
accommodating airlines that have hubs within the MENA and Middle East regions pose an
imminent threat to Logan International Airport as terror groups can use this transportation sector
Criticality Assessment:
Within New England there are approximately ten major airports that provide the
region with domestic and some international travel. However, Logan International Airport
(BOS), is the primary source for domestic and international travel to all within the region. Logan
International Airport is one of the nation’s busiest airports that contains four passengers and 94
gates that provide more than 40 airlines with non-stop domestic and international travel to over
100 destinations (MassPort, 2017). Having such a large destination pattern, it is evident that the
use of this airport is pertinent to the region’s economic and socioeconomic stability. The
transportation of goods, services, and people through this airport is valuable to not only the
immediate region, but the United States, as this airport is one of the main-ports of transportation
of goods, people, and services to-and-from the United States. Logan International Airport is a
success-way for local, and regional travelers. While providing immediate transportation
opportunities for domestic and international passengers; as it maintains an effective aid in the
safeguarding of the American people and the region’s economic stability. According to the 2016
Airport generated $586.5 million in revenue, proving its worth and importance to the region’s
economic stability. Logan also provided 3.7 million passengers with flights to domestic and
The Massachusetts Port Authority yearly statistics report in 2017 provided information
that 2.9 million passengers used Logan International Airport for domestic destinations, while 2.4
million domestic destinations were used for the transportation of cargo (Massport, 2017). After
19
Threat Assessment
reviewing these statistics, it is evident that Logan International Airport plays a large role in the
transportation of services, people, and goods. Logan’s tight security and current risk assessment
also provides the nation with a sense of safety and aids in the current National Security Strategy
of reinforcing homeland security and strengthening our national defense (White House, 2015).
Depending on the threat actor, the level of damage to this infrastructure could be either
minimal or extensive. With the current threat of physical harm by many different threat actors
such as the Islamic State of Iraq and Levant (ISIL), Al-Qaeda, and Al-Shabaab, the level of
damage may be uncertain. However, with the information that can be collected through previous
attacks, it is certain that this infrastructure can develop a comprehensive risk assessment that can
determine the potential impact of a threat. As it stands, Logan International Airport employs
approximately 16,000 employees, operates within a 2,400-acre area, and contains over 40
different airliners. These physical attributes must be taken into consideration when looking at the
potential damage that can be done. While approximately 1,000 passengers travel through Logan
each day, there is a massive risk for a mass-casualty event. By using different methods relating to
attack type and weaponry used, a threat actor could potentially cause hundreds-to-thousands of
deaths in one attack and incapacitate more than half of the infrastructure with different weaponry
such as explosives, firearms, and possibly even chemical attacks. Each attack would produce
different statistical data correlating with the number of casualties and infrastructure damage.
goods, and the transportation of services, it would cause an immediate financial constraint on the
Physical Security:
Within the physical security at Logan International Airport, it is crucial that the
attack. Since the attacks of September 11, 2001, Logan International Airport has increased their
physical security and checkpoint strategies to assure the highest of quality in their physical
security. The airport must first develop information leading to the identification of threat
variables in order to effectively identify weaknesses. By identifying such weaknesses, the airport
can then develop an effective comprehensive plan to increase the physical security. Increasing
the number of trained physical security specialists and train them in threat-detection and threat-
analysis, the overall security and safety of the airport will increase. An overall SWOT analysis of
the infrastructures physical security will also aid in the identification of weaknesses.
Cyber/Network Security:
Even though there has not been a large threat pertaining to cyber or network attacks
pertinent to the overall security of the infrastructure. Within the network, there is a vast amount
of personal information of employees and customers, flight information, and critical security
plans. By identifying weaknesses within the cyber-network will avow the airport to increase their
network security in order to prevent threat actors from gaining access to the network. Also,
increasing their technology within the network is important as technology continues to increase
Personnel security is a key factor to improving the infrastructures safety and stability.
Personnel security specialists can improve the overall security of the region and safeguard key
assets within the infrastructure. Conducting a SWOT analysis of the airports personnel security
plan can identifying weaknesses within the overall security and safety plan. Focusing on the
collection and use of personnel security specialist can allow the airport to collect information to
develop other security strategies and other countermeasures. Increasing the personnel security
presence within the infrastructure will not only deter a threat or threat actor from committing a
threat, but the airport can use these personnel security specialists in identifying suspicious
Synopsis of Components:
within the critical infrastructures main security strategy will deter threat actors from committing
attacks, if used effectively. Effectively training all involved within the security strategy in the
detection and prevention of violent and cyber-attacks will increase the overall safety of all
passengers, employees, and the American people. If security specialists can detect and attack
early, the chances of preventing the specified attack are higher; while protecting the
infrastructures key assets and potentially identifying weaknesses within the infrastructure
security strategy. Not only will implementing these countermeasures protect all key assets and
saving human lives, these countermeasures will aid in the protection of the infrastructure and
High-Tech Elements:
Explosive Detection
Systems
Low-Tech Elements:
Locks
24
Threat Assessment
Security Signs
No-Tech Elements
Security Posts
Staff Training
25
Threat Assessment
citizens and first responders during major emergency incidents. FEMA aids in the logistic
national security plan. FEMA also supports countermeasure development, threat and
emergency mitigation, and identifies all assets that need aid and support. (McLamb,
2017, p.2).
(2) The National Transportation Safety Board (NTSB) is a federal agency that is
responsible for investigation civil aviation accidents within the United States and any
other significant accidents in other modes or divisions in transportation. The NTSB also
and their family members that have been impacted by major transportation disasters
(NTSB, 2017). The NTSB supports the aviation division during critical infrastructure
(3) The Federal Bureau of Investigations (FBI) is a federal intelligence-driven and threat-
focused national security organization with both intelligence and law enforcement
responsibilities that protect the United States from terrorism, espionage, cyber-attacks,
and major criminal threats (FBI, 2010). The FBI would support the aviation subsector
and Logan International Airport during the threat assessment process through asset
mitigation process during an attack at Logan International Airport. Boston Police would
respond and coordinate with other federal and state agencies to develop response plans
and aid in the reduction of casualties and support on-going investigations while ensuring
(5) Department of Homeland Security is another federal agency that would aid in asset
terrorism and enhancing security to safeguard the American people. The Department of
Homeland Security responds and aids in the investigation and mitigation process of large-
scale threats and terror attacks within the United States (McLamb, 2017, p.4).
(6) The Central Intelligence Agency (CIA) is yet again another federal agency that supports
security functions, correlating and evaluating intelligence, and supporting other federal
agencies during national terror attacks or large-scale events. The CIA would support all
coordinate with other federal, local, and state agencies to assist in the intelligence
(7) The FAA or Federal Aviation Administration focuses on a mission of providing the
safest and most efficient aerospace system in the world (FAA, 2017). The FAA would aid
Logan International Airport with security and threat identification, along with
27
Threat Assessment
vulnerability identification. The FAA focuses on the nations aerospace industry and
focuses on making our nations aviation system safer through mitigating threats and
identifying potential threat actors. This agency would be used during the mitigation and
p.5).
(8) The American National Red Cross is a private-sector resource that would aid critical
infrastructure during a large-scale attack in the mitigation process. This resource would
aid victims and first responders in donating blood, fundraising operations, insurance
(9) U.S Customs and Border Protection is a federal law enforcement agency that focuses
on safeguarding the American people and serves as the nation’s premier law enforcement
agency (CBP, 2017). This agency would aid in the threat assessment process by working
with other state, local, and federal agencies to identify threats, locate threats, develop
in the mitigation process, and identify potential threats; while providing national security
(10) Department of Defense (DOD); this agency focuses on national security and responds
to large-scale terror attacks or any situation that may potentially affect national security.
Within the transportation-systems aviation division, the Department of Defense would focus
on the mitigation process and threat identification. The DOD, through military assets, would
respond with potential defense techniques and focus its operations on evidence-driven
intelligence. If an attack were to occur within Logan International Airport, the Department of
Defense may aid in the investigation and reaction place process (McLamb, 2017, p. 5)
28
Threat Assessment
Appendix
Threat Assessment
Ra = Racial N = Nuclear
1 2 1 2 0 4 9 P,S C,E
Vulnerability Assesment
5=
maximum
risk
1. Level of visibility Risk Rating Logan international Airport (BOS) is located within Boston Massachusetts.
=5 Being the primary source of domestic and international travel for New
England and one of the largest airports within the United States. The level
of visibility risk was placed at (5) due to the large population that surrounds
the airport and the number of other critical infrastructures that are present
within the city of Boston. Boston, also being one of the larger cities within
the United States. Logan International Airport is not only known to New
England, but its existence is nationally recognized; leading to a risk rating of
(5).
29
Threat Assessment
2. Criticality of the Risk Rating Being located within Boston, there are many different governmental
target to the =4 assets, local assets, and a large population within the immediate area.
jurisdiction Meaning the functionality of the airport is deemed critical while having
those other assets also being so closed to the infrastructure.
3. Potential population Risk Rating Even though Logan International Airport is a large infrastructure and is
capacity =2 responsible for the transportation of thousands and thousands of domestic
and international travelers, the airport capacity would not exceed over
5,000 at one time. Leading the risk rating to be labeled as low.
4. Potential for Risk Rating Even though the capacity may not exceed 5,000 at one time, there is a
collateral mass =4 large number of domestic and international travelers within the airport at
casualties one time. Meaning there are substantial numbers of people congregating
within one specific area inside the airport. Also, having the airport located
within the city of Boston that is estimated to contain approximately
600,000 people, the potential for collateral mass casualties must be
labeled as high.
5. Impact outside of Risk Rating The economic and environmental impact of the incapacitation of the Logan
the jurisdiction =4 International Airport would be detrimental. Being so close to large
infrastructures and close to the ocean (environmental), along with being a
large infrastructure that is worth millions of dollars, transporting goods and
people both domestically and internationally, assess the criticality risk
being at a high level.
6. Existence of Risk Rating Due to the fact there is not existing Weapons of Mass Destruction within
weapons of mass =0 this specified critical infrastructure, the risk rating was placed a “0”,
destruction meaning no risk.
7. The potential threat Risk Rating Being an airport, there is a fair level of access throughout the
element’s level of =3 infrastructure. However, there is a level of security that one must pass
access to the target through in order to gain access to the main aviation gates and rest of the
airport. With this being said, the level of “medium” security within the
Logan International Airport places the level of access risk at a “medium”
threat level.
Raw Score: Add up ratings for factors 1–7 and enter the total in box A on the right. A. 22
Man-made (Terrorist) Vulnerability Assessment Rating: Convert the raw score to a rating B. 8
using the key on the bottom of p. 79 of your textbook. Enter this number in box B on the right.
30
Threat Assessment
You will use this number as the vulnerability assessment value in the risk assessment
calculation in the Module Six Worksheet.
Risk Assessment
Definitions:
Threat: The likelihood that a particular asset, system, or network will sustain an attack or
an incident;
Vulnerability: The likelihood that a characteristic of or flaw in an asset, system, or
network’s design, location, security posture, process, or operation renders it susceptible
to destruction, incapacitation, or exploitation by terrorist or other intentional acts;
Consequence: The negative effects on public health and safety, the economy, public
confidence in institutions, and the functioning of government, both direct and indirect,
that can be expected if an asset, system, or network is damaged, destroyed, or disrupted
by a terrorist attack (Allen & Derr, 2015, p. 103).
Risk Calculation Formula: R = T x V x C
Logan International Risk Formula Calculation:
T = 9, V = 8, C = 7
T(9) x V(8) x C(7) = 504
504 = Moderate Risk
31
Threat Assessment
References
Allen, G., & Derr, R. (2015). Threat assessment and risk analysis: An applied approach.
Boston, MA: Elsevier Science.
Department of Homeland Security. (2017). What Is Critical Infrastructure? Retrieved
October 08, 2017, from https://www.dhs.gov/what-critical-infrastructure
MassPort. (2017). About Boston Logan International Airport (BOS). Retrieved October
22, 2017, from http://www.massport.com/logan-airport/about-logan/
Massachusetts Port Authority. (2016). Comprehensive Annual Financial Report (Rep.).
Retrieved October 22, 2017, from Finance Department website:
https://www.massport.com/media/1354/mpa-fy16-cafr-final.pdf
Massachusetts Port Authority. (2013). MASSPORT INFRASTRUCTURE ASSET
MANAGEMENT BOSTON LOGAN INTERNATIONAL AIRPORT (Rep.). Retrieved
http://www.aci-
na.org/sites/default/files/sleiman_massport_infrastructure_asset_management_021913.pdf
MassPort. (2017, August). Monthly Airport Traffic Summary - August 2017. Retrieved
October 8, 2017, from http://www.massport.com/media/2561/0817-avstats-airport-traffic-
summary.pdf
McLamb, J. (2017). Resource Identification. Resource Identification. Retrieved
November 3, 2017.
McLamb, J. (2017). Milestone One. Retrieved November 1, 2017.
McLamb, J. (2017). Milestone Two. Retrieved November 4, 2017.
McLamb, J. (2017). Miles5one Three. Retrieved November , 5 2017.
White House. (2015). 2015 National Security Strategy. Retrieved October 22, 2017, from
http://nssarchive.us/wp-content/uploads/2015/02/2015.pdf
U.S Department of Transportation. (2017). Transportation Systems Sector. Retrieved
September 23, 2017, from https://www.dhs.gov/transportation-systems-sector