(3) The device can be given to authorized personnel entering the area. Do
so by using bribery or coercion. This could also be done by secreting it in their
clothing or accessories such as purses or briefcase.
i. Upon completion of vulnerability tests, results should be reported. This
should be done preferably in writing. The report should be carefully reviewed and
analyzed by the provost marshal, physical security manager, and those with a need
The review and analysis should provide an evaluation of the physical
security program. The report should also serve as a basis or guide for effecting
Review and analysis of methods and procedures used for
vulnerability tests give guidance for future tests.