In Milestones One and Two, you researched and analyzed threat and vulnerability and briefly presented the findings. In Milestone Three,
Learning Goal: I’m working on a criminal justice question and need an explanation to help me learn.
Overview: In Milestones One and Two, you researched and analyzed threat and vulnerability and briefly presented the findings. In Milestone Three, since you have already researched consequences (criticality) in assignment 6-1 and countermeasures in assignment 7-1, and calculated the level of risk in assignment 6-2, your goal as the analyst will be to review your findings and summarize them for leadership. As a reminder, leadership decisions could impact the deployment of personnel, equipment, and budgetary resources.
The purpose of Milestone Three is to summarize the ideas that you will present to leadership. You will complete this milestone in two sections: Consequence Assessment and Countermeasures. Because this milestone is also a draft of most of Sections IV and V of your final project, by completing the milestone, you will be doing most of the preparation required for these sections of the final project, and you will benefit from your instructor’s feedback when polishing your final project draft. When using the feedback from the instructor on this milestone, be sure to review it with the final project side by side to make sure you are addressing all critical elements.
Prompt: Specifically, the following critical elements must be addressed:
V. Consequence Assessment: In this section, you will gauge the importance of the key asset to the community by considering the adverse consequences that would result from the loss of or serious damage to the asset. Consequences will include human impact, economic impact, and the impact on public confidence or government capability. You will use the information you learned in the 6-1 short paper (consequence analysis) to complete this section. Also share all findings from your risk calculations and risk level. Remember that you are writing this for leadership to make decisions, so it must be well-polished, organized, documented, and written in the third person. Include the resources and methods used to make your determination.
Begin with an introduction in which you do the following:
B. Explain your consequence analysis process.
C. Explain the importance of this key asset as it applies to these things: • Human impact • Economic impact • Impact on public confidence • Impact on government capability
Next, using your earlier vulnerability analysis, describe what you believe will be the most likely attack scenario.
A. Predict the level of damage that terrorist groups could inflict on the key asset if the attack were successful. Support your prediction with historical sector-attack examples.
D. Provide an estimate of the severity of adverse consequences if an attack were to occur on the key asset. Use the following scale: low, medium, or high. Explain to leadership how your calculations were made in order to justify your reasoning. Use the result of your risk assessment calculation (from Module Six) as the estimate. (Remember the lessons learned from your case study in Module One, in which the mayor raised concerns about how your risk analysis process was done.)
VI. Countermeasures: In this section, you will use the findings from the Module Seven short paper and your understanding of vulnerabilities. Again, you will make recommendations to leadership on how to mitigate the terrorist threat. You will use the latest technology countermeasures to address three key areas: physical, cyber, and personnel security.
A. Recommend countermeasures to increase the security of the key asset, and explain how each countermeasure will help address the key asset’s vulnerabilities. Your recommendations should address the following components: i. Physical security ii. Cybersecurity iii. Personnel security
B. Defend why implementing these countermeasures would help deter any known or potential terrorist threats to the key asset. Include public use images of each countermeasure. Include your CPTED strategy within the physical security section.
Answer preview for In Milestones One and Two, you researched and analyzed threat and vulnerability and briefly presented the findings. In Milestone Three,