ABSTRACT

‘The strongest castle walls are not proof against a traitor within.’ This ancient proverb applies more strongly each year with growing scope for treachery as electronic technology develops. So the control of access and the identification of moles, sleepers, intruders, impersonators, criminals and terrorists have become more crucial than the efficiency of perimeters, surveillance systems and alarms. The main risk is of entry through the front door.