It appears that some of the protesters who got into the RNC did so using legitimate credentials they were given by Republican delegates. There's probably a whole article on security design to be written around that simple fact, but I'm too tired to do it right now.