Threat Assessment Process Flow.
By Tom Clarke,
Framework: The framework in our risk assessment for all security facets (Corporate, Guest, Community Security, Awareness Development and VIP services) is as follows:
- Establishing Security Provisions
- Data Collection through surveying physical premises
- Human geographical methodology focusing on concentric rings of near to far factors to include
- Social and political dynamics
- Threat Analysis
- Vulnerability Analysis
- Analysis of Policies and Procedures
- Correlation and Assessment of Risk Acceptability
- Data Collection through surveying physical premises
Establishing and Identifying Security Provisions: A key element is to construct the framework. The security provisions supply the analyst with intelligence required, identifying what needs to be protected and the sensitivity of what is being protected outlining the protocol for scalability of sustainability to deploy a reactionary force if warranted.
ATAC’s analysis team starts to compile an evidence-based assessment. The ATAC Analysis team will be identifying vantage points from neighboring buildings, highways, interior/exterior perimeters, traffic patterns, location of senior staff’s physical location, human and non-human threats, exits/escapes, entrance and exit choke points, media access and more.
The week of surveying physical premises, some team members will be in plain clothes and others visible. They will need unrestricted access to but not limited to:
- Security CSO
- Interviews with key personnel
- Cafeteria
- Visitor check in/out location
- CCTV station
- Intrusion detection testing
- Interior and exterior structure, e.g., HVAC, water, plumbing, electrical.
- Auditing Airbnb current security Policies and SOPs. Identifying any missing, undocumented or suggested incorporation of additional policies and SOPs.
- Physical construction of corporate HQ and Key Personnel residences