could be used by an intruder; and it provides material for corrective instruction.
(2) Specifically, the test should examine:
(a) Improper enforcement of identification
security personnel. Examples are failure to:
1 Determine authority for entry.
Scrutinize identification media.
The ways of using fake
credentials to dupe security are many.
There is only one way to detect such
trickery; that is, know the details of each type of access credentials; examine
Security tests and inspections have shown that unauthorized
persons have been granted access to restricted areas. They have gained access by
altering or forging passes.
They have faked identification by telephone.
have also gained access by playing upon the sympathy of security personnel with
3 Ascertain identity.
4 Detain unauthorized persons.
5 Conduct immediate preliminary search of suspects.
6 Enforce security procedures.
7 Report security violations.
(b) Susceptibility or gullibility of security personnel.
often believe plausible stories by intruders.
Sometimes these stories come from
members of the security force and other post personnel.
This inclination to
believe a person who may be trying to gain illegal access to a restricted area is
the product of two factors. These factors are monotony and a desire to save time.
Persons authorized into a restricted area are often busy coming and going;
therefore, it is easy for them to deceive the security personnel with slight
evidence. Verifying hundreds of valid access credentials is boring. This can dull
the sensitivity to detect one which is false.
Many attempts to dupe security
personnel involve false credentials.
They also involve assumed rank or falsely
personnel of the post.
c. Test planning and preparation.
Detailed planning and preparation is a
requirement for effective testing of security.
Planning should include the
(1) Plan in secrecy to avoid alerting post personnel.
Prior knowledge by
the security forces or others produces invalid test results. It thus defeats the
purpose of the test.