G-TAP®

The Gregg Threat Assessment Program (G-TAP®) is a computer based vulnerability assessment tool used to determine security system effectiveness. Using public domain formulas and algorithms, it models the behavior of the protection system being evaluated and assigns a numeric value to the effectiveness of the system for ease of interpretation. Simply put, it evaluates security system effectiveness versus dollars spent.

G-TAP® provides a means for documenting the rationale for the decisions and ratings that are assigned in the assessment of a facility’s security. G-TAP® is used to perform system effectiveness, risk calculations and for documenting the results of the tabletop discussion. The G-TAP® Program is designed to require as little data entry as possible. The final deliverable is a report detailing the current system effectiveness against the specified threat with recommendations for improvement.

The program:

  • Provides an assessment tool that can be used when decisions must be made quickly, such as for temporary security plans, or to evaluate the feasibility of a conceptual design.
  • Ensures the stakeholders “buy in" - It becomes their assessment since they make the decisions.
  • Provides a consistent method of documenting the rationale for decisions in the assessment or upgrading of a facility.
  • The user enters qualitative ratings that the program converts to quantitative values which are then used to calculate risk based on a user-defined library of potential consequences. The process has been automated as much as possible to minimize data entry and perform calculations. A team or a single individual formally applies the methodology to document the basis for their decisions.

Listed below are some of the reasons that the G-TAP® methodology has been selected by Gregg customers over other computer models that are available.

Attribute G-TAP® Other Computer Models
Ease of use
  • User friendly
  • Easily adapted to unique facility needs
  • Clearly documented and traceable
  • Complex (not intuitive)
  • Strict input requirements regardless of facility.
  • Difficult for the layperson to understand.
Data needed
  • Expert judgment
    Uses previous test data
  • Extensive detailed data needed.
  • Extensive performance testing
Tactics
  • Force, stealth, and deceit
  • Primarily use of force
User training
  • Primarily OJT with minimum classroom training.
  • Extensive classroom and On-the-Job-Training (OJT)
User skills
  • Minimum computer skills
  • Good computer skills
Time/Cost
  • Minimum time and resources required - low cost can be applied quickly at low cost
  • Extensive development cost
    Time consuming and costly to apply

An individual with little computer training or experience should be able to operate the G-TAP® program. If the response to a question or a narrative is the same as in earlier parts of the document, all appropriate portions are loaded when the information is first entered (multiple entries of the same information is not required).

Results
The following five screen shots taken from G-TAP® enable the reader to rapidly see security strengths and weaknesses.

  • Screen describes the target, threat, adversary, adversary dedication, tactics and weapons.
  • Screen describes the defense strategy.
  • Screen describes the scenario and baseline security condition.

  • Screen describes detection opportunities.
  • Screen shows an example of the ability to incorporate photographs, plot plans, drawings or other reference material.
  • Screen describes the layers of protection and critical detection points.
  • Screen describes the probability of sensing, assessment and neutralization.
  • Screen overlay shows the protection system effectiveness and compares the base case and upgrade case.
  • Individual elements are color coded red, yellow or green to highlight positive and negative areas of concern.
  • Screen shows comparisons between detection levels and each upgrade modeled.
  • Screen also shows system effectiveness versus dollars spent (bottom right line graph).

Additional Software Considerations

  • The software has been used by the Defense Threat Reduction Agency to evaluate system effectiveness for the protection of international nuclear and biological assets.
  • It has been used by Defense Threat Reduction Agency to evaluate international border security effectiveness.
  • It has been identified as the vulnerability assessment software of choice by the Defense Threat Reduction Agency for the biological threat reduction program.
  • The software has been reviewed by the Department of Energy’s vulnerability assessment working group for use at domestic and international nuclear weapons facilities.
  • The software is approved by the Canadian Department of Foreign Affairs and International Trade.
  • The Defense Contract Audit Agency has audited the cost of the software.
  • The software has been evaluated by the Department of Commerce for export control restrictions.

Most importantly, G-TAP® has been used to evaluate security at more than 88 biological and nuclear asset production and storage locations for the Department of Energy, Defense Threat Reduction Agency and the Canadian Department of Foreign Affairs.

With an Export Control Classification of 5D992 there are few limitations on the world wide use of G-TAP®.

Available NOW on GSA Schedule 84.

2014 Gregg Protection Services, Inc. Home | About Us | Services | Contact Us