Hlsc 730-discussion 2-reply 1 | HLSC 730 – Counterterrorism and Counterintelligence Strategies | Liberty University

The thread must be a minimum of 200-250 words. MINIMUM OF TWO SOURCES BESIDES THE TEXTBOOK. Must cite at least 2 sources in addition to the Bible.

TEXTBOOK: Prunckun, H. (2019). Counterintelligence theory and practice (2nd ed.). New York, NY: Rowman & Littlefield Publishers. Inc. ISBN: 9781786606884.

Ronczkowski, M. R. (2018). Terrorism and organized hate crime. (4th ed.). Boca Raton FL: Taylor & Francis (CRC Press). ISBN: 9781138703469.


Logical Model for Threat

The logical model for threat is an analysis tool that enables intel personnel to gauge the threat level of an identified adversary, and whether the threat has both the intent and capability to conduct an attack on a designated target (Pruncken, 2019). Analysts examine “two elements for each of these factors: desire and expectation (or ability) for intent, and knowledge and resources for capability” (Pruncken, 2019, p. 69). The logical model can also be expressed as an equation in the form of threat = (desire + expectation) + (knowledge + resources) (Pruncken, 2019). 

The threat potential is analyzed from the perspective of an adversary conducting an offensive attack that is directed at human targets. Threats cannot originate from a “nonhuman source, such as fire, flood, storm, wind, earthquake, and other forms of nature-induced events, as well as events caused by accident, mishap, misfortune, coincidence, and chance” (Pruncken, 2019, p. 68). These items are categorized as hazards and are considered during the risk assessment phase. Regarding the logical model for threat, Pruncken (2019) describes the four criteria of the threat model: desire is the threat’s motivation to cause harm; expectation is the threat’s confidence level in carrying out a successful attack; knowledge is having the necessary skills to conduct the attack; and resources include the skill level of the adversary and the materials they possess to carry out the attack. 

Physical Security 

Physical security is one of the four principal defensive counterintelligence domains, as well as one of the most important aspects of defensive security measures. Physical security consists of deterrence measures that are intended to ‘strengthen’ a potential and make the target less attractive for an adversary to attack. Pruncken (2019) notes that examples of physical security controls include the following measures, along with some examples: 

Barrier controls- Fences, gates, etc.  

Doors- Strong, solid doors with secure locking mechanisms.  

Entry and exit controls- Vehicle and pedestrian access points with secured badge access. 

Windows- Fortified windows that are lockable, shatterproof, and in some cases, unable to be opened. 

Secure containment- Badge access within the secured buildings, vaults and safes placed as needed, and laminated glass in applicable locations. 

Security lighting- Well-lit areas throughout the compound and adjacent areas.  

Closed-circuit television- 24 hr surveillance equipment.  

Intruder detection systems- Alarm systems in case of perimeter or interior breach. 

Drone defense- Ability to implement drones to facilitate and augment security patrols. 

Computer physical security- Having a secure means of storing computer hardware and IT equipment. 

Guarding services- Employing qualified and trained security personnel to protect the installation. 

Sensitive compartmented information facility- Secured locations inside a secured installation that requires a higher level of access, such as a top-secret level secured area that is constantly monitored.  

Safe houses- Areas that agents can utilize within the general populace to conduct their operations. 

Environmental design considerations- Utilizing environmental design to deter crime and intruders.  

Christian Worldview 

Job 11:18 (English Standard Version) fittingly states “And you will feel secure, because there is hope; you will look around and take your rest in security.” References 

Holy Bible (English Standard Version). https://www.openbible.info Links to an external site. 

Prunckun, H. (2019). Counterintelligence theory and practice (2nd ed.). Rowman & Littlefield. 

Redmond, P. J. (2010). The challenges of counterintelligence. Rutland. 

Ronczkowski, M. R. (2018). Terrorism and organized hate crime. (4th ed.). Taylor & Francis (CRC Press).