|
The Anti-Terror Risk identification Matrix (ATRiM)
emerges from a new generation of Crime Prevention Through Environmental Design based in action research. The system incorporates insights from acts of terror and other outsider crime threats. The audit is applied by prevention science specialists, who are certified in its use. We work directly with your employees, teaching the workings of the auditing process; until they can be certified to annually update your infrastructure threat risk assessment and protection. |
About the Audit Process
An ATRiM auditing specialist conducts a preliminary review of your site(s). This includes interviews with personnel. An auditing schedule is created from a profile of the site functions and operations. It uniquely includes the wider threat environment around the facility. The specialists, in conjunction with your employees, then assemble a small, vetted security team of key personnel in your organization. In turn, they apply the Audit protocols for collecting data at every level of the site. This includes daytime and night-time audits, external and internal reviews, and assessments of personnel and security operations.
The results of the audit are compiled into a summary chart for preparing a detailed report. The report delivery includes a list of priorities, suggestions for improvement, and the development - or enhancement - of current security procedures. This may include engineering and architectural redesigns, new security technology and operations, internal reviews of screening and training, the impact of organizational culture on the threat environment, and a list of next steps.
The results of the audit are compiled into a summary chart for preparing a detailed report. The report delivery includes a list of priorities, suggestions for improvement, and the development - or enhancement - of current security procedures. This may include engineering and architectural redesigns, new security technology and operations, internal reviews of screening and training, the impact of organizational culture on the threat environment, and a list of next steps.