4 For realism, simulated time of detonation should be indicated on
the device.
There is always the chance that the device will be found before the
simulated time of detonation.
5 Planting of the device should be related to the type used.
It
should be placed to simulate the greatest amount of destruction or to achieve the
desired results.
d. Test instructions.
(1) The officer in charge of the test should select the method or
techniques to be used.
Selection should be based on the ability of testing
personnel. It should also be based on supporting materials available.
(2) This officer should provide for flexibility in selection of targets.
His orientation to team members should include the following instruction:
(a) Exploit any security weakness that becomes evident during the test.
(b) Change tactics to take evasive action as necessary.
(c) Strike targets of opportunity.
(3) Remember the test objectives.
(a) Estimate vulnerability for the CO.
(b) Determine effectiveness of security force and other personnel.
(c) Alert guard force and CO to possible techniques of an attempted
security breach.
(d) Provide information for corrective action.
(4) Personnel assigned to conduct vulnerability tests should be given only
limited information about the post or facility. Such knowledge would be the same
that an outsider would normally have or could get reasonably.
e. Test safety. Instructions to test team members should also include safety
precautions. Test personnel should not:
(1) Scale barriers of any kind.
Guards may have instructions to fire.
(2) Forcibly resist apprehension.
There is too much danger involved.
By
resisting apprehension, personnel will nullify benefits to be achieved.
MP1000
4-16