SlideShare a Scribd company logo
1 of 13
- PowerPoint by Jeffery Martin
SUSPICIOUS ACTIVITY REPORTING
• Both past and recent terror attacks
show that events that may seem
unrelated may actually be part of a
larger plot.
• Prior to terrorist acts, the terrorist
usually engage in precursor
activities; where they make plans,
acquire materials, collect
information, and commit other
criminal acts.
• These actions will produce
behaviors that may seem
suspicious and may provide clues as
to what may lie ahead.
SUSPICIOUS ACTIVITY
• Suspicious activity is defined as
“Observed behavior reasonably
indicative of preoperational
planning, related to terrorism or
other criminal activity”.
• When thinking about suspicious
activity do not focus on “who”;
instead focus on “what”.
• A persons race, ethnicity, nationality,
or religious beliefs do not make a
person “suspicious”.
• When reporting suspicious activity ,
focus on the observable behaviors;
such as the location of the activity,
the timeline of events, and the tools
and methods used (cameras,
binoculars, fake I.D.s, etc.).
WHAT IS SUSPICIOUS ACTIVITY?
• A breach, or attempted breach, of a
secured area.
• A person that is lying about their
identity, or trying to use false
identification, insignias, or
documentation.
• Theft, loss, or diversion of materials
associated with the facility.
• Vandalism of a facility or protected
site.
• Cyber attacks to attempt to disrupt an
organization’s IT systems.
• Expressed or implied threats to
damage or compromise a facility or
structure.
• Unusual or dangerous aviation
activity in the area, that has been
recently interpreted as suspicious; or
poses a threat to people or property.
• Someone asking for specific facility,
operations, or security information.
• Testing security systems, by pulling
fire alarms, opening doors armed
with an alarm, etc.
• Storing unusual quantities of
materials; such as weapons,
chemicals, cell phones, and laptop
computers
TYPES OF SUSPICIOUS ACTIVITIES
• Prior to a terrorist attack or other
planned criminal act, the actors
usually perform some type of
adversarial surveillance.
• Adversarial Surveillance is the
gathering of information in
preparation for an action that is
aggressive or criminal in nature.
• These actions include domestic and
international terrorism, crimes
against individuals, espionage, theft,
stalking, and destruction of property.
ADVERSARIAL SURVEILLANCE
• When planning illegal activities –
including terrorist attacks or other
crimes – perpetrators may conduct
surveillance to try to learn all they
can about:
 The location.
 Building access, egress, or
vulnerabilities.
 Routine activities of employees,
suppliers, customers, and visitors.
 Security protocols or equipment.
 Other relevant information.
ADVERSARIAL SURVEILLANCE (CONTINUED)
The following types of information can
be collected through adversarial
surveillance:
• Facility layout, including access and
egress routes
• Locations and numbers of security
personnel and cameras
• Timing of routine events
• Security/visitor processes and
procedures
• Security equipment, including
badges and uniforms
• Access requirements for restricted
or employee-only areas
• Information about maintenance and
cleaning personnel or procedures
ADVERSARIAL SURVEILLANCE (CONTINUED)
• Surveillance is usually the weak
point in the planning process for
terrorist attacks or other criminal
acts.
• This is because It takes time, and
may involve repeated visits.
• Surveillance may take place over
several days, weeks, or longer.
• Surveillance by highly trained
individuals can be hard to detect;
however experience has shown us
that individuals involved in planning
terrorism are not always well-trained
or equipped, and are more
vulnerable to detection by
employees, passers-by, and others.
DETECTING ADVERSARIAL SURVEILLANCE
• In order to detect surveillance by
adversaries, first you should take
note of activities you observe that
are typically associated with
surveillance, such as watching a
location or recording information
about it over time.
• Next, you should evaluate any
surveillance-related activities that
you observe to determine if they
seem unusual or noteworthy. Often,
you will find that surveillance
activities will appear unusual and out
of place.
DETECTING ADVERSARIAL SURVEILLANCE
(CONTINUED)
• In order to raise awareness, and
emphasize the importance of citizen
reporting, the Department of
Homeland Security launched the “If
You See Something, Say Something”
campaign.
• Illegal or suspicious activities should
be reported to Security and/or local
law enforcement; for investigative
follow-up, and recording.
REPORTING
• When you report suspicious activity
to Security, they will investigate the
event, gather information, look for
any trends or patterns, and decide if
local law enforcement needs to be
notified.
• When suspicious activity is reported
to law enforcement, they will
provide it to a local fusion center for
further review.
WHAT HAPPENS AFTER A REPORT HAS BEEN
MADE?
• Fusion center receive information
from a variety of sources, such as
suspicious activity reports (SARs)
from law enforcement, citizen
reporting, emergency responders,
and other government entities;
including federal partners.
• Qualified analysts at these centers
review the information and decide if
there are any possible links to
potential terrorist attacks, and if the
information meets the criteria for
sharing nationwide.
FUSION CENTERS
• If the information meets the criteria
to be shared nationwide, it is
reported to the Nationwide SAR
Initiative (NSI), and forwarded to the
Federal Bureau of Investigation
(FBI), and law enforcement agencies
across the nation; for investigative
follow-up.
FUSION CENTERS (CONTINUED)

More Related Content

What's hot

Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Bomb Threat Its Detection & Prevention
Bomb Threat Its Detection & PreventionBomb Threat Its Detection & Prevention
Bomb Threat Its Detection & PreventionSunjib Anwar
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collectiongagan deep
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
Role of Vigilance.pptx
Role of Vigilance.pptxRole of Vigilance.pptx
Role of Vigilance.pptxssuserc67962
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorFarook Al-Jibouri
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
Vigilance
VigilanceVigilance
VigilanceNCDB
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
Guía de seguridad proteccion perimetral…clave de la seguridad fisica
Guía de seguridad proteccion perimetral…clave de la seguridad fisica Guía de seguridad proteccion perimetral…clave de la seguridad fisica
Guía de seguridad proteccion perimetral…clave de la seguridad fisica miguel911
 

What's hot (20)

Interview & Interrogation
Interview & Interrogation Interview & Interrogation
Interview & Interrogation
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Bomb Threat Its Detection & Prevention
Bomb Threat Its Detection & PreventionBomb Threat Its Detection & Prevention
Bomb Threat Its Detection & Prevention
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
2.5 security officers
2.5 security officers2.5 security officers
2.5 security officers
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Role of Vigilance.pptx
Role of Vigilance.pptxRole of Vigilance.pptx
Role of Vigilance.pptx
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Vigilance
VigilanceVigilance
Vigilance
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Workplace Security practices
Workplace Security practicesWorkplace Security practices
Workplace Security practices
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Guía de seguridad proteccion perimetral…clave de la seguridad fisica
Guía de seguridad proteccion perimetral…clave de la seguridad fisica Guía de seguridad proteccion perimetral…clave de la seguridad fisica
Guía de seguridad proteccion perimetral…clave de la seguridad fisica
 
Vigilance
VigilanceVigilance
Vigilance
 

Similar to Suspicious Activity Reporting

Cybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxCybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxadnis1
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessEric Schiowitz
 
CRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILEDCRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILEDAmb Steve Mbugua
 
Chapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptxChapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptxKettyM1
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptxaratibhavsar
 
Antiterrorism Point of Instruction
Antiterrorism Point of InstructionAntiterrorism Point of Instruction
Antiterrorism Point of InstructionCaleb Lin, MBA
 
Investigation and Crime Scene Preservation Seminar.pptx
Investigation and Crime Scene Preservation Seminar.pptxInvestigation and Crime Scene Preservation Seminar.pptx
Investigation and Crime Scene Preservation Seminar.pptxMichaelOnia
 
Internal security and forensic science
Internal security and forensic scienceInternal security and forensic science
Internal security and forensic sciencePrashant Mehta
 
Surveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxSurveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxitzmerhuzieeee
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.pptharshbj1801
 
When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)Britton Gallagher
 
International Standards & Action to Combat Money Laundering 11- Legal Aspects...
International Standards & Action to Combat Money Laundering 11- Legal Aspects...International Standards & Action to Combat Money Laundering 11- Legal Aspects...
International Standards & Action to Combat Money Laundering 11- Legal Aspects...LawrenceMutinda1
 
Police & Forensic Science
Police & Forensic SciencePolice & Forensic Science
Police & Forensic ScienceMadona Mathew
 
Crime scene management
Crime scene managementCrime scene management
Crime scene managementShreyas Patel
 
Physical access control
Physical access controlPhysical access control
Physical access controlAhsin Yousaf
 

Similar to Suspicious Activity Reporting (20)

Cybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxCybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptx
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
Investigation & report writing
Investigation & report writingInvestigation & report writing
Investigation & report writing
 
CRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILEDCRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILED
 
new resume TMilano15
new resume TMilano15new resume TMilano15
new resume TMilano15
 
Chapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptxChapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptx
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
 
IQ4 Final Presentation (1)
IQ4 Final Presentation  (1)IQ4 Final Presentation  (1)
IQ4 Final Presentation (1)
 
Antiterrorism Point of Instruction
Antiterrorism Point of InstructionAntiterrorism Point of Instruction
Antiterrorism Point of Instruction
 
Investigation and Crime Scene Preservation Seminar.pptx
Investigation and Crime Scene Preservation Seminar.pptxInvestigation and Crime Scene Preservation Seminar.pptx
Investigation and Crime Scene Preservation Seminar.pptx
 
Internal security and forensic science
Internal security and forensic scienceInternal security and forensic science
Internal security and forensic science
 
Surveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxSurveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptx
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt
 
ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)
 
When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)
 
International Standards & Action to Combat Money Laundering 11- Legal Aspects...
International Standards & Action to Combat Money Laundering 11- Legal Aspects...International Standards & Action to Combat Money Laundering 11- Legal Aspects...
International Standards & Action to Combat Money Laundering 11- Legal Aspects...
 
Police & Forensic Science
Police & Forensic SciencePolice & Forensic Science
Police & Forensic Science
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
Physical access control
Physical access controlPhysical access control
Physical access control
 

Recently uploaded

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Recently uploaded (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Suspicious Activity Reporting

  • 1. - PowerPoint by Jeffery Martin SUSPICIOUS ACTIVITY REPORTING
  • 2. • Both past and recent terror attacks show that events that may seem unrelated may actually be part of a larger plot. • Prior to terrorist acts, the terrorist usually engage in precursor activities; where they make plans, acquire materials, collect information, and commit other criminal acts. • These actions will produce behaviors that may seem suspicious and may provide clues as to what may lie ahead. SUSPICIOUS ACTIVITY
  • 3. • Suspicious activity is defined as “Observed behavior reasonably indicative of preoperational planning, related to terrorism or other criminal activity”. • When thinking about suspicious activity do not focus on “who”; instead focus on “what”. • A persons race, ethnicity, nationality, or religious beliefs do not make a person “suspicious”. • When reporting suspicious activity , focus on the observable behaviors; such as the location of the activity, the timeline of events, and the tools and methods used (cameras, binoculars, fake I.D.s, etc.). WHAT IS SUSPICIOUS ACTIVITY?
  • 4. • A breach, or attempted breach, of a secured area. • A person that is lying about their identity, or trying to use false identification, insignias, or documentation. • Theft, loss, or diversion of materials associated with the facility. • Vandalism of a facility or protected site. • Cyber attacks to attempt to disrupt an organization’s IT systems. • Expressed or implied threats to damage or compromise a facility or structure. • Unusual or dangerous aviation activity in the area, that has been recently interpreted as suspicious; or poses a threat to people or property. • Someone asking for specific facility, operations, or security information. • Testing security systems, by pulling fire alarms, opening doors armed with an alarm, etc. • Storing unusual quantities of materials; such as weapons, chemicals, cell phones, and laptop computers TYPES OF SUSPICIOUS ACTIVITIES
  • 5. • Prior to a terrorist attack or other planned criminal act, the actors usually perform some type of adversarial surveillance. • Adversarial Surveillance is the gathering of information in preparation for an action that is aggressive or criminal in nature. • These actions include domestic and international terrorism, crimes against individuals, espionage, theft, stalking, and destruction of property. ADVERSARIAL SURVEILLANCE
  • 6. • When planning illegal activities – including terrorist attacks or other crimes – perpetrators may conduct surveillance to try to learn all they can about:  The location.  Building access, egress, or vulnerabilities.  Routine activities of employees, suppliers, customers, and visitors.  Security protocols or equipment.  Other relevant information. ADVERSARIAL SURVEILLANCE (CONTINUED)
  • 7. The following types of information can be collected through adversarial surveillance: • Facility layout, including access and egress routes • Locations and numbers of security personnel and cameras • Timing of routine events • Security/visitor processes and procedures • Security equipment, including badges and uniforms • Access requirements for restricted or employee-only areas • Information about maintenance and cleaning personnel or procedures ADVERSARIAL SURVEILLANCE (CONTINUED)
  • 8. • Surveillance is usually the weak point in the planning process for terrorist attacks or other criminal acts. • This is because It takes time, and may involve repeated visits. • Surveillance may take place over several days, weeks, or longer. • Surveillance by highly trained individuals can be hard to detect; however experience has shown us that individuals involved in planning terrorism are not always well-trained or equipped, and are more vulnerable to detection by employees, passers-by, and others. DETECTING ADVERSARIAL SURVEILLANCE
  • 9. • In order to detect surveillance by adversaries, first you should take note of activities you observe that are typically associated with surveillance, such as watching a location or recording information about it over time. • Next, you should evaluate any surveillance-related activities that you observe to determine if they seem unusual or noteworthy. Often, you will find that surveillance activities will appear unusual and out of place. DETECTING ADVERSARIAL SURVEILLANCE (CONTINUED)
  • 10. • In order to raise awareness, and emphasize the importance of citizen reporting, the Department of Homeland Security launched the “If You See Something, Say Something” campaign. • Illegal or suspicious activities should be reported to Security and/or local law enforcement; for investigative follow-up, and recording. REPORTING
  • 11. • When you report suspicious activity to Security, they will investigate the event, gather information, look for any trends or patterns, and decide if local law enforcement needs to be notified. • When suspicious activity is reported to law enforcement, they will provide it to a local fusion center for further review. WHAT HAPPENS AFTER A REPORT HAS BEEN MADE?
  • 12. • Fusion center receive information from a variety of sources, such as suspicious activity reports (SARs) from law enforcement, citizen reporting, emergency responders, and other government entities; including federal partners. • Qualified analysts at these centers review the information and decide if there are any possible links to potential terrorist attacks, and if the information meets the criteria for sharing nationwide. FUSION CENTERS
  • 13. • If the information meets the criteria to be shared nationwide, it is reported to the Nationwide SAR Initiative (NSI), and forwarded to the Federal Bureau of Investigation (FBI), and law enforcement agencies across the nation; for investigative follow-up. FUSION CENTERS (CONTINUED)