Facility Intrusion | Scope of Risk

A facility breach may be due to unintentional intrusion by ignorant trespassers—for example, as a result of the facility being on traditional trade or migration routes by nomads—or it may be done by opportunistic and unrefined criminal elements seeking to pilfer materials; by organized crime seeking to steal highvalue assets; or by insurgents, terrorists, or specialinterest group activists seeking to kidnap employees, damage critical infrastructures, or make a public statement to support their cause. Intrusion may be slowed by physical security structures and manpower provided to protect a facility, and alerts may come from human or technological measures. Typically the security plan for a facility or critical infrastructure will outline the measures used to deter, detect, delay, prevent, and respond to an intrusion. Where mature security plans and policies are not in place or a nonsecuritytrained manager is in charge of the first stages of a response, the IMP will play a crucial role in providing guidance to assist in managing the situation until law enforcement or other response agencies can deploy and resolve the situation.
Add a note hereIn the event of a physical security breach of a facility, it is important that both immediate and interimterm risks are identified, understood, and mitigated. The nature of the intrusion will largely determine the actions taken (i.e., if intruders are armed or unarmed; if they intend to harm individuals, steal property, or damage infrastructures). The following common threats are posed by facility intrusion:
§  Add a note herePhysical or psychological threats to personnel, including assault, intimidation, and kidnapping.
§  Add a note hereThreats to critical infrastructures: explosive hazards, vandalism, and contamination.
§  Add a note hereTheft or damage to assets and other materials.
§  Add a note hereEspionage and data theft.
§  Add a note hereCorporate reputation and image risks.
§  Add a note hereDisruption to operational and business productivity.
§  Add a note hereSitins or unlawful occupancy of areas or work spaces.
§  Add a note hereLiability and legal risks.
Add a note hereIn addition, the nature of security policies and resources in place to protect a facility will also guide the response measures (e.g., mature or inadequate policies and plans, and a robust and armed security force or an insubstantial and unarmed response force). Longterm risks will be the responsibility of the crisis response group, who should address shortfalls and gaps within any security plan and associated policies and resource levels. Local site or incident managers should determine the following facts as the basis of their response decision paths:
§  Add a note hereWhere has the breach occurred?
§  Add a note hereWhen did it occur?
§  Add a note hereAre intruders armed and violent?
§  Add a note hereHow many intruders are there? Is their location known? What do they look like?
§  Add a note hereWhat is their intent, and what other threats might be posed by the intruders?
§  Add a note hereCan organic security resources counter those of the intruders?
§  Add a note hereWhat level of support is available from government or other agencies?
§  Add a note hereWhat personnel are at risk, and can they be secured?
§  Add a note hereWhat resources of infrastructures are at risk, and can they be secured?
Add a note hereThe IMP should complement a mature and wellconstructed security plan where possible. The IMP should be tied to standard operating practices and preprepared security response protocols to ensure that security personnel, or other employees, carry out immediate actions upon notification of a security breach. Where security plans and resources are not in place, the IMP should be focused on ensuring the safety of personnel and the protection of vulnerable or highvalue resources or assets, while guiding law enforcement or other resources to the point of threat.

0 comments:

Popular Posts