U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

What Do You Do When the Risk Is High? Nine Companies Respond to an NRC Study

NCJ Number
95862
Journal
Security Management Volume: 28 Issue: 10 Dated: (October 1984) Pages: 46-61
Author(s)
W Y Ishimoto
Date Published
1984
Length
16 pages
Annotation
The potential threat from outsiders or external adversaries to nonnuclear commercial industries similar to nonnuclear commercial industries similar to nuclear plants and the defenses used against such a threat are analyzed.
Abstract
Defensive weaknesses as well as adversarial strengths are examined. Defensive vulnerabilities include weaknesses in the security force, the physical barrier, the sensor/ alarm/closed-circuit television, and the entry control system. Adversarial strengths include speed and force of action, equipment sophistication, and special skills possessed by the adversary. Research consisted of a broad-based literature survey and interviews with nine different types of nonnuclear commercial industries. All the industries had experienced burglary or theft, and five had experienced bombings or bomb threats. Several had experienced robbery, embezzlement/fraud, vandalism/physical assault, demonstrations, or extortion. One had experienced hostage taking/kidnapping. None had experienced arson or sabotage. Little data were available about outside adversaries except that they are likely to have two major skills--knowledge of electronics and knowledge of explosives. They may have a variety of equipment including explosives, thermal lances, core drills, radio scanners, portable transceivers, cryogenics, and computers. Detection and prevention strategies include guard forces, fixed posts, patrols, physical barriers, entry control systems, material handling and inspection, sensors and alarms, lighting, a response force, and employee screening. Various industries also outlined some unique approaches. Tables are provided. Appendixes list the literature survey sources and outline varying levels of security.