Travel Reference
In-Depth Information
These devices are designed to prevent a vehicle from being able to get too
close to the building's exterior. These measures are relatively inexpensive
but effectively prevent an attack such as occurred in Oklahoma City. If the
bomb cannot be placed in close proximity to the structure, the blast will
not be directed and much of the force will dissipate, resulting in damage
that will be relatively light. In some cases, however, the actual physical
location of a structure relative to a public thoroughfare will make the facil-
ity vulnerable notwithstanding the installation of barriers. There are lit-
erally thousands of sensitive facilities situated right along main traffic
arteries that are open to heavy trucks and other commercial traffic. Under
these conditions it is absolutely impossible to prevent an attack by a car
or truck bomber. Even if bollards are placed along the roadway in order
to prevent such an attacker from jumping the curb and detonating close
to the building, an attack is still likely to be successful if the distance from
the street to the facade of the building is a mere 15 to 20 feet.
Prior to running out and ordering millions of dollars of protective
equipment, professionals should evaluate the overall security of your facil-
ity and a detailed report of the results should be prepared. Our firm,
Global Security Group, LLC, is one of several capable and experienced
enough to provide the type of detailed and comprehensive evaluation nec-
essary for this process. The first step in the process is to have a complete
risk assessment done for your particular circumstance. There are many
factors that need to be considered, such as the nature of your business,
the location of the facility, and its desirability as a political target, as well
as any history of terrorist or criminal activity directed toward the company.
Environmental factors are considered. The historical and present level of
terrorist organizational activity as a whole is also of critical importance.
Exhibit 12.2 is an example of a typical risk assessment format.
The actual physical security evaluation must be made only after the
level of risk has been determined. Current security measures are then
carefully analyzed and evaluated in relation to the perceived threat level.
Exhibit 12.3 shows what a comprehensive evaluation should include.
Each category shown in Exhibit 12.3 will be analyzed and evaluated.
A detailed report will be generated and specific recommendations for
change will be made. The more competent firms will note deficiencies and
will prioritize the corrective actions that must be taken. It is then up to
the client to follow through and correct the noted deficiencies. The task
of most consulting firms will end upon the delivery of the final written
evaluation. Some firms, like our own, offer an additional service. They will
Search WWH ::




Custom Search