Assessing the security benefits of a trusted traveler program in the presence of attempted attacker exploitation and compromise