
280 ◾ Risk Assessment and Security
systems including clandestine tunnels for WMD production (illustrated in
Figures 7.7, 7.8, 7.10, 7.11, 7.13, 7.14, 7.16, 7.18 and 7.20). e event tree analyses
are presented in Figures 7.9, 7.12, 7.15, 7.17, 7.19, and 7.21. e risk rates for the
event tree analyses are provided in Tables 7.23 through 7.28.
e analyses presented in Tables 7.29 through 7.31 have a similar implica-
tion as the analyses presented in the previous Tables 7.10 through 7.12, that
alternative 2 would provide the most eective result for the protection of critical
assets. One requisite to detect illegal clandestine subterranean infrast ...