Someone recording or monitoring activities. This may include the use of cameras, note taking, drawing diagrams, annotating on maps, or using binoculars or other vision-enhancing devices.
People or organizations attempting to gain information about military operations, capabilities, or people. Elicitation attempts may be made by mail, email, telephone, or in person. This could also include eavesdropping or friendly conversation.
Tests of Security
Any attempts to measure reaction times to security breaches, attempts to penetrate physical security barriers, or monitor procedures in order to assess strengths and weaknesses.
Suspicious transactions involving large cash payments, deposits, or withdrawals are common signs of terrorist funding. Collections for donations, the solicitation for money and criminal activity are also warning signs.
Purchasing or stealing explosives, weapons, ammunition, etc. This also includes acquiring military uniforms, decals, flight manuals, passes or badges (or the equipment to manufacture such items) and any other controlled items.
People who don’t seem to belong in the workplace, neighborhood, business establishment, or anywhere else. This includes suspicious border crossings, the impersonation of law enforcement, military personnel, or company employees is also a sign.
Putting people in position and moving them around according to their plan without actually committing the terrorist act. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow.
People and supplies getting into position to commit the act. This is the person’s last chance to alert authorities before the terrorist act occurs.
For Emergency Threats/Incidents Involving Suspected Acts of Terrorism
Would you like to submit attachments (pics/video) to your report?
Fill out the form below.