Access control requirements include vetting and selection; control of admission of staff by a guard
checking identification or by electronic locks operated by a key card; checking credentials of visitors
and contract workers and tying down responsibility for their supervision while they are inside;
detecting impersonators (see pp. 78-80); and spotting would-be terrorists or criminals, including
hijackers, by detecting suspicious personal characteristics or weapons or explosives.