GSS utililzes international best practices to conduct vital area identiciation/target set identification.For Vital Area and Target Set Identification a sabotage logic model is first
created for various sequences that could lead to significant core damage.
From the sabotage logic model, targets are evaluated based on the adversary’s capabilities (DBT). From the sabotage logic model targets, an Area Logic model is created to identify locations on the site where the
targets / mitigating systems can be disabled. The Area Logic model is then
used to create ‘candidate Vital Areas’. Each candidate Vital Area will be
evaluated by Security to determine adequacy and core damage
preventability of each candidate Vital Area
DBT Analysis and
Explosive Validation Testing
GSS has an abundance of knowldedge concerning
Adversary Pathway Analysis
Comprehensive assessment of
potential intrusion routes and
vulnerabilities
Timeline Analysis
Detailed evaluation of response
times and adversary progression
scenarios
Complement Determination
Assessment of minimum personnel
requirements for effective security
response according to the DBT.
Tactical Response Planning
Development and implementation of
comprehensive response strategies
based on DBT explosive capabilities
and other capabilities
Explosive Testing
Validation of barrier effectiveness
against explosive threats according
to DBT capabilities
Exercise Programs
Development and implementation of
realistic security exercise scenarios
as it relates to DBT capabilities
Adversary Pathway Analysis
Comprehensive assessment of
potential intrusion routes and
vulnerabilities
Timeline Analysis
Detailed evaluation of response
times and adversary progression
scenarios
Complement Determination
Assessment of minimum personnel
requirements for effective security
response according to the DBT.
Tactical Response Planning
Development and implementation of
comprehensive response strategies
based on DBT explosive capabilities
and other capabilities
Explosive Testing
Validation of barrier effectiveness
against explosive threats according
to DBT capabilities
Exercise Programs
Development and implementation of
realistic security exercise scenarios
as it relates to DBT capabilities