ABSTRACT

Access control requirements include vetting and selection; control of admission of staff by a guard

checking identification or by electronic locks operated by a key card; checking credentials of visitors

and contract workers and tying down responsibility for their supervision while they are inside;

detecting impersonators (see pp. 78-80); and spotting would-be terrorists or criminals, including

hijackers, by detecting suspicious personal characteristics or weapons or explosives.