Skip to main content

Currently Skimming:

3 Threat Assessment and Vulnerability Analysis
Pages 17-26

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 17...
... Twentythree areas of concern are listed; in Appendix A, these areas of concern are expanded into a sample checklist that illustrates how a vulnerability analysis could be conducted. Other Reference Works A great number of commercially available manuals and other documents exist to help security planners analyze the risk, conduct threat assessments, and undertake building vulnerability analyses.
From page 18...
... The committee urges security planners and managers to keep current, through the literature or otherwise, with developing security technologies and with new security management techniques. THREAT ASSESSMENT It is necessary to establish a base line or minimum acceptable level of protection for a federal office building to be able to determine an acceptable risk.
From page 19...
... Quite obviously, a federal day care center would differ from a military intelligence office, and knowIedge of the history of hostile acts against a type of federal agency may be among the most important components of a terrorism threat assessment. However, even when no evidence exists that a given type of federal agency previously has been targeted, a threat analysis is far from complete.
From page 20...
... ~ an internal information management matter. It is the responsibility of each federal agency to assure that information pertinent to a threat analysis is in the hands of the party responsible for making the analysis.*
From page 21...
... For example, the Deputy Assistant Secretary of State for the Diplomatic Security Service is required to "consult regularly with federal law enforcement and intelligence agencies, including the Federal Bureau of Investigation and United States Secret Service..." as well as with state and local law enforcement agencies with respect to certain security matters (22 C.F.R.
From page 22...
... However, there does not now appear to exist a formal system for the reporting or sharing of such information between building occupants or enforcement agencies to the extent that it would be useable for effective threat assessment planning. The Domestic Terrorism Unit ~ the most likely central federal office to have responsibility for the coordination of information pertinent to a threat assessment The committee believes that a formal means of threat communication should be established between the security management team (for the building occupants)
From page 23...
... 8. What information do federal law enforcement officials have with respect to your concern?
From page 24...
... If an agency cannot be adequately protected in a particular building, or if the mere presence of such a relatively high-risk tenant unposes excessive security restrictions on other le~sensitive tenants, relocation of the high-risk tenant to a different building should be considered. Agencies that manage federal office buildings, such as the General Services Administration, should give careful consideration to the proposed agency occupancy mix when planning new buildings and relocating tenants.
From page 25...
... Employee and visitor controls - Positive ID systems - Visitor access procedures/clearance 10. Mail handling areas - Processing areas - Inspection procedures - Outside storage areas 11.
From page 26...
... 1985. Effective Security Management (Second Edition)


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.