SlideShare a Scribd company logo
1 of 1
Download to read offline
School Bus Drivers
                                                                                 Watch for Suspicious
                                                                              ITEMS and BEHAVIOR




Characteristics of Suspicious Items:                                   Suspicious Behavior Includes Persons:
     •	 Are	abandoned	or	hidden	in	unusual	place                           •	 Abandoning	item(s)	and	leaving	quickly
     •	 Have	leaking	gas,	vapor,	odor	or	suspicious	substance		            •	 Showing	an	unusual	interest	in	employees,	children,		
   	    (including	excessive	grease)                                     	     the	school	or	bus	stop	locations
     •	 Contain	exposed	wires	or	timer                                     •	 Being	where	they	are	not	supposed	to	be
     •	 Have	an	attached	message	with	threatening	note	or		                •	 Possessing	a	weapon	or	dangerous	item
   	    suspicious	marking                                                 •	 Using	a	vehicle	in	a	suspicious	way	(illegally	parked,		
                                                                         	     erratic	driving,	following)
Potentially Suspicious Items:                                              •		 Causing	disruptions	or	distractions
	 Canister,	propane	style	tank,	metal	box,	bottle,	out	of		
	 place	items


If You See Suspicious Items and/or Behavior:
     •		 IMMEDIATELY	report	suspicious	item	and	behavior	to		               •		 Do	NOT	move	or	touch	item	or	device
   	     your	dispatch,	school	administrator,	local	authorities	or		        •		 Report	location	of	scene
   	     911                                                                •		 Include	physical	appearance,	gender,	unusual		
     •		 Do	NOT	use	radio	or	cell	phone	within	50	feet	of	item		          	     characteristics
   	     or	device                                                          •		 Report	clothing	characteristics
     •		 Pay	attention	to	location	of	item	or	device


Suspicious Reporting Number:


                                                                                      Transportation Sector Network Management
                                                                                                   Highway and Motor Carrier Division
                                                                                                    www.tsa.gov/what_we_do/tsnm

More Related Content

More from Ehab El Barbary

More from Ehab El Barbary (20)

Fire extinguisher training
Fire extinguisher trainingFire extinguisher training
Fire extinguisher training
 
Fire pumps
Fire pumpsFire pumps
Fire pumps
 
Fire life
Fire lifeFire life
Fire life
 
Ehc brochure
Ehc brochureEhc brochure
Ehc brochure
 
Customer services.
Customer services.Customer services.
Customer services.
 
Criss mangment
Criss mangmentCriss mangment
Criss mangment
 
Contents administration & general
Contents   administration & generalContents   administration & general
Contents administration & general
 
Certficate
CertficateCertficate
Certficate
 
Ccc brochure
Ccc brochureCcc brochure
Ccc brochure
 
Building evac flow chart
Building evac flow chartBuilding evac flow chart
Building evac flow chart
 
Bomb threatmanagement
Bomb threatmanagementBomb threatmanagement
Bomb threatmanagement
 
Atf bomb threats
Atf bomb threatsAtf bomb threats
Atf bomb threats
 
Appendix a.7.6 type 2 fire system drill report code2 chi spa
Appendix a.7.6 type 2 fire system drill report code2 chi spaAppendix a.7.6 type 2 fire system drill report code2 chi spa
Appendix a.7.6 type 2 fire system drill report code2 chi spa
 
Apartment patrol scan last
Apartment patrol scan lastApartment patrol scan last
Apartment patrol scan last
 
Alert levels to staff bomb threat.doc11
Alert levels   to staff bomb threat.doc11Alert levels   to staff bomb threat.doc11
Alert levels to staff bomb threat.doc11
 
Action plan for the new cctv operators
Action plan for the new cctv operatorsAction plan for the new cctv operators
Action plan for the new cctv operators
 
Action plan for ss
Action plan for ssAction plan for ss
Action plan for ss
 
Accidenclub car
Accidenclub carAccidenclub car
Accidenclub car
 
444444444444
444444444444444444444444
444444444444
 
1618 damage of the hotel property
1618  damage of the hotel property1618  damage of the hotel property
1618 damage of the hotel property
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Suspicious itemsbehavior

  • 1. School Bus Drivers Watch for Suspicious ITEMS and BEHAVIOR Characteristics of Suspicious Items: Suspicious Behavior Includes Persons: • Are abandoned or hidden in unusual place • Abandoning item(s) and leaving quickly • Have leaking gas, vapor, odor or suspicious substance • Showing an unusual interest in employees, children, (including excessive grease) the school or bus stop locations • Contain exposed wires or timer • Being where they are not supposed to be • Have an attached message with threatening note or • Possessing a weapon or dangerous item suspicious marking • Using a vehicle in a suspicious way (illegally parked, erratic driving, following) Potentially Suspicious Items: • Causing disruptions or distractions Canister, propane style tank, metal box, bottle, out of place items If You See Suspicious Items and/or Behavior: • IMMEDIATELY report suspicious item and behavior to • Do NOT move or touch item or device your dispatch, school administrator, local authorities or • Report location of scene 911 • Include physical appearance, gender, unusual • Do NOT use radio or cell phone within 50 feet of item characteristics or device • Report clothing characteristics • Pay attention to location of item or device Suspicious Reporting Number: Transportation Sector Network Management Highway and Motor Carrier Division www.tsa.gov/what_we_do/tsnm