iStock-1314879006.jpg

Indicators

You know your community better than anyone. No else can spot something odd or out of place better than you.

Whether you are on your way to work, walking in your neighborhood, or out and about in your community, remember: We all play a role in keeping our communities safe. Remember to stay vigilant and say something when you see signs of suspicious activity.

What to look out for:

expressed-threat.png

EXPRESSED OR IMPLIED THREAT

Threatening to commit a crime that could harm or kill people or damage a facility, infrastructure, or secured site.

photography.png

SURVEILLANCE

A prolonged interest in or taking pictures/videos of personnel, facilities, security features, or infrastructure in an unusual or covert manner.

theft-diversion.png

THEFT/LOSS/

DIVERSION 

Stealing or diverting items—such as equipment, uniforms, or badges—that belong to a facility or secured site.

testing-security.png

TESTING OR PROBING OF SECURITY

Investigating or testing a facility’s security or IT systems to assess the strength or weakness of the target.

aviation-activity.png

AVIATION ACTIVITY

Operating or interfering with the operation of an aircraft that poses a threat or harm to people and property.

cyber-attack.png

CYBERATTACK

Disrupting or compromising an organization’s information technology systems.

eliciting-information.png

ELICITING INFORMATION

Questioning personnel about security that goes beyond mere curiosity about an event, facility, or operations.

abandoned-packages.png

ABANDONED PACKAGES

Unattended bags or boxes left in public places.

unattended-vehicles.png

UNATTENDED VEHICLES

Cars, trucks, vans, and any other type of vehicle left in No Parking Zones.

smells-or-smoke.png

SUSPICIOUS SMELLS

Worrisome and/or unusual smells or smoke in the area, especially around trash cans.

breach-intrusion.png

BREACH/ATTEMPTED INTRUSION

Unauthorized people trying to enter a restricted area or impersonating authorized personnel.

misrepresentation.png

MISREPRESENTATION

Presenting false information or  misusing documents to conceal possible illegal activity.

acquisition-expertise.png

ACQUISITION OF EXPERTISE

Gaining skills or knowledge on a specific topic, such as facility, security, military tactics, or flying an aircraft.

material-acquisition.png

GETTING MATERIALS TO MAKE WEAPONS

Acquisition and/or  storage of unusual materials such as cell phones, radio controllers, or toxic materials.

sector-specific-incident.png

SECTOR-SPECIFIC INCIDENT

Actions which raise concern to specific sectors, (e.g., power plants) with regard to their personnel, facilities, systems, or functions.

recruiting-financing.png

RECRUITING/

FINANCING

Funding suspicious or criminal activity or recruiting people to participate in criminal  or terrorist activity.

sabotage-damage.png

SABOTAGE/TAMPERING/

VANDALISM

Damaging or destroying part of a facility, infrastructure, or secured site.

weapons-storage.png

WEAPONS COLLECTION/

STORAGE

Collection or discovery of unusual amounts of weapons including explosives, chemicals, or other destructive materials.