Not necessarily, but I see your point. The threat model you suggest seems to be for a "one and done" event (which is a perfectly valid scenario). But the initial threat model was geared towards repeated, quick, and relatively inconspicuous access to a secure facility.