(3) Use dangerous materials.
These might cause harm to any person involved
directly or indirectly.
(4) Use any action
equipment of the post.
f. Techniques for infiltration of security areas.
vulnerability tests should consider the following techniques.
These are to be used
for infiltration of secured areas.
(1) Enter through unguarded gates or open areas.
These should not be under
observation by security forces or other persons.
(2) Use false or altered passes or badges.
Show these at active gates
manned by security. They usually give only a slight glance at these IDs.
(3) Enter through areas without showing identification.
(a) One way is to bypass security forces.
Do this by mingling with a
work group entering the area.
(b) Another method is to get permission to enter the area.
of identification; use a plausible story.
(c) A third way involves deception by false representation.
member of the test team poses as a high-ranking officer or civilian dignitary. Or
he might pose as a repairman, installer of equipment, inspector, etc.
people who have legitimate business in the area.
g. Neutralization of escorts. Making successful entrance to a security area
is only the first step. Testers must then, in many cases, neutralize an assigned
They must do so to accomplish the test mission.
(1) When operating as a team, use ruses to divert the escort's attention.
(2) Request use of latrine; leave if not accompanied by escort.
(3) Devise any other means as opportunities occur.
However, use no force
to overpower the escort.
h. Planting simulated sabotage devices.
Procedures to follow for planting
simulated devices include the following:
(1) The device should be planted appropriately, if access can be gained.
should be put in the place where it would do the most damage.
(2) Place on any vehicle entering the area.