(2) Set a priority of targets that seem more vulnerable than others.
not test the same target on a continuous basis. Try to test all eligible targets
over time. This will keep all personnel alert, rather than those of only one area.
(3) Select qualified people to conduct vulnerability tests.
personnel should include the following:
(a) All personnel should have appropriate security clearances.
should be at the same or higher level of the area or post to be entered.
clearances preclude any compromise of security interests if a safe is found open.
Also, if an area with classified matter is entered, security will not be
(b) Members of the test team should be unknown to members of the
security force. Members should also be unknown to other personnel of the post or
(c) Team members should be capable of quick thinking to adapt to their
(d) Members should be able to bluff in a convincing manner.
(e) The cover story should originate with the provost marshal or
physical security manager. A well-contrived cover story is necessary. It should
sound convincing to provide a good test of the security force.
(4) Obtain appropriate material for testing.
This may include:
(a) Clothing appropriate to assumed identity.
(b) Props necessary to support cover story.
(c) Tools appropriate to assumed identity, such as repairman or plumber.
(e) False or altered credentials.
(f) Simulated sabotage devices to provide realism. These might include
explosives, incendiaries, abrasives, corrosive acids, etc.
These devices should
meet the following criteria:
1 The device should be suitable for the target.
2 The device should be the same size and weight as the genuine