31 Aug 2022

136

Analysis of Morey Unit Hostage Situation

Format: APA

Academic level: College

Paper type: Coursework

Words: 842

Pages: 3

Downloads: 0

The incident happened on 18th January 2004 during the morning hours. The occurrence was about the largest prison hostage at the Arizona State Prison Complex (Peak et al., 2008). Two prison inmates named Coy and Wassenaar attempted to escape and served a life sentence and 26 years respectively. Both prison inmates were housed with dangerous prisoners, and that they were offered a different location from other prisoners. Morey Unit had 100 prisoners at the time, which was the largest accommodation number in the entire Arizona State prison system. Coy and Wassenaar succeeded in seizing the unit tower and taking the correctional officers hostage. Seizing the unit tower was an added advantage to the prison inmates. Since their first plan failed, these two inmates planned for the second attempt. When they realized the escape was not possible in all ways, Coy and Wassenaar chose to control the unit by taking the guards hostage (Rigby, 2004). The incident happened in 15 days, with Coy and Wassenaar treating the hostages brutally and placing the negotiators in an immitigable situation. The 15 days were characterized by sexual assault and violence to other inmates and the guards. 

Recommendations for Mitigation 

One recommendation is that contractors who work for the prisons should have been considered instead of prison inmates. The fact that prisoners working in prison was deemed economical due to cheap labor provisions can see all prison segments. As a result, multiple prisoners often think of how they can find their way out. Coy and Wassenaar had excessive access to all the prison areas, making them take control of the guard tower. The other recommendation is that frequent shakedowns could have been conducted to discover shanks in the inmate cells before they were accessed. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

National Infrastructure Protection Plan Framework 

National Infrastructure Protection Plan (NIPP) clearly defines the critical infrastructure protection responsibilities and roles for Homeland Security and establishes a comprehensive risk management concept or framework. The NIPP offers the coordinated framework that will help establish the requirements, goals, and priorities for infrastructure protection so that resources and funding are effectively applied (Hemme, 2015). The purpose of NIPP is to ensure that potential and known threats are addressed based on the coordinated risk-based programs and plans through the help of CI/KR security partners. These security partners can help the NIPP share and comprehend efficient resource use and implementation of the risk management plan. 

Contrast of Public-Private Partnerships 

Infrastructure is one of the most significant elements of a nation as it has to remain resilient and protected from any possible failures and forms of attacks. An established infrastructure's responsibility relies on both the private and the public sector to ensure the proper infrastructure update. Public-private sector partnerships are often linked to transport infrastructure-based projects. Public-private partnerships provide advantages for both sectors, such as the innovative technology that can also be disadvantageous for the private sector. For instance, railways and roads entail construction risk. If the products fail in timely delivery or have technical defects, or have increased cost estimates, then the private partner incurs the burden. The private sector also experiences availability risks because, at times, the private company cannot meet the standards or safety, leading to contract loss. 

Steps of Vulnerability Assessment 

The first step entails initial assessment. Defining every device's critical value and risk is imperative to identifying the assets dependent on the client's input. The input may include an assessment vulnerability scanner. It is essential to determine if any company staff can access the devices or access the authorized users and administrators. The various aspects of the initial assessment include the business impact analysis, residual risk treatment, risk tolerance level, and risk appetite. The second step is the system line definition which comprises gathering systems information prior to the vulnerability assessment. The device should be reviewed to check its services, processes, and open ports that need to be closed all the time. Comprehending the software and approved drivers is significant to ensure proper installation. 

The third step is to conduct the vulnerability scan. The assessment scanner needs to use the right policy to have the desired outcomes. Before introducing the vulnerability scan, the company's compliance requirements need to be evaluated to know when the scan can be performed based on date and time (Meulenbelt e al., 2019). For the desired outcomes, the related plug-ins and tools to be used on the vulnerability assessment platform include full scan, aggressive scan, stealth scan, firewall scan, and CMS web scan comprised of Drupal, WordPress, and Joomla. The last step is the development of the vulnerability assessment report. This phase is essential regarding the addition of recommendations depending on the initial assessment objectives. The risk mitigation techniques are added depending on the criticalness of the outcome and available assets. Findings of the gap between the system baseline definition and the recommendation are critical. The results also need to be analyzed to help mitigate possible vulnerabilities and correct any deviations. 

Conclusion 

The Morey Unit hostage incident was one of the longest standoffs in the country. There were lessons learned for the affected state and the entire country. Much planning is needed to help in mitigating any potential vulnerability. Criminal behavior needs to be analyzed to help in forecasting such future incidences. The NIPP assists in dealing with potential threats and vulnerabilities on state-level facilities. Creating a working private-public sector partnership helps to ensure proper infrastructure helps in avoiding inmates taking advantage of the prison setup. 

References 

Hemme, K. (2015). Critical infrastructure protection: Maintenance is national security.  Journal of Strategic Security 8 (3), 25-39. 

Meulenbelt, S. E., Van Passel, M. W., De Bruin, A., Van Den Berg, L. M., Schaap, M. M., Rutjes, S. A., ... & Bleijs, D. A. (2019). The Vulnerability Scan, a web tool to increase institutional biosecurity resilience.  Frontiers in public health 7 , 47. 

Peak, K. J., Radli, E., Pearson, C., & Balaam, D. (2008). Hostage Situations in Detention Settings: Planning and Tactical Considerations.  FBI L. Enforcement Bull. 77 , 1. 

Rigby, M. (2004, 15 th July). Arizona Prisoners Seize Tower; State Officials Point Fingers. Retrieved from https://www.prisonlegalnews.org/news/2004/jul/15/arizona-prisoners-seize-tower-state-officials-point-fingers/ 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Analysis of Morey Unit Hostage Situation .
https://studybounty.com/analysis-of-morey-unit-hostage-situation-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration