SlideShare a Scribd company logo
- PowerPoint by Jeffery Martin
SUSPICIOUS ACTIVITY REPORTING
• Both past and recent terror attacks
show that events that may seem
unrelated may actually be part of a
larger plot.
• Prior to terrorist acts, the terrorist
usually engage in precursor
activities; where they make plans,
acquire materials, collect
information, and commit other
criminal acts.
• These actions will produce
behaviors that may seem
suspicious and may provide clues as
to what may lie ahead.
SUSPICIOUS ACTIVITY
• Suspicious activity is defined as
“Observed behavior reasonably
indicative of preoperational
planning, related to terrorism or
other criminal activity”.
• When thinking about suspicious
activity do not focus on “who”;
instead focus on “what”.
• A persons race, ethnicity, nationality,
or religious beliefs do not make a
person “suspicious”.
• When reporting suspicious activity ,
focus on the observable behaviors;
such as the location of the activity,
the timeline of events, and the tools
and methods used (cameras,
binoculars, fake I.D.s, etc.).
WHAT IS SUSPICIOUS ACTIVITY?
• A breach, or attempted breach, of a
secured area.
• A person that is lying about their
identity, or trying to use false
identification, insignias, or
documentation.
• Theft, loss, or diversion of materials
associated with the facility.
• Vandalism of a facility or protected
site.
• Cyber attacks to attempt to disrupt an
organization’s IT systems.
• Expressed or implied threats to
damage or compromise a facility or
structure.
• Unusual or dangerous aviation
activity in the area, that has been
recently interpreted as suspicious; or
poses a threat to people or property.
• Someone asking for specific facility,
operations, or security information.
• Testing security systems, by pulling
fire alarms, opening doors armed
with an alarm, etc.
• Storing unusual quantities of
materials; such as weapons,
chemicals, cell phones, and laptop
computers
TYPES OF SUSPICIOUS ACTIVITIES
• Prior to a terrorist attack or other
planned criminal act, the actors
usually perform some type of
adversarial surveillance.
• Adversarial Surveillance is the
gathering of information in
preparation for an action that is
aggressive or criminal in nature.
• These actions include domestic and
international terrorism, crimes
against individuals, espionage, theft,
stalking, and destruction of property.
ADVERSARIAL SURVEILLANCE
• When planning illegal activities –
including terrorist attacks or other
crimes – perpetrators may conduct
surveillance to try to learn all they
can about:
 The location.
 Building access, egress, or
vulnerabilities.
 Routine activities of employees,
suppliers, customers, and visitors.
 Security protocols or equipment.
 Other relevant information.
ADVERSARIAL SURVEILLANCE (CONTINUED)
The following types of information can
be collected through adversarial
surveillance:
• Facility layout, including access and
egress routes
• Locations and numbers of security
personnel and cameras
• Timing of routine events
• Security/visitor processes and
procedures
• Security equipment, including
badges and uniforms
• Access requirements for restricted
or employee-only areas
• Information about maintenance and
cleaning personnel or procedures
ADVERSARIAL SURVEILLANCE (CONTINUED)
• Surveillance is usually the weak
point in the planning process for
terrorist attacks or other criminal
acts.
• This is because It takes time, and
may involve repeated visits.
• Surveillance may take place over
several days, weeks, or longer.
• Surveillance by highly trained
individuals can be hard to detect;
however experience has shown us
that individuals involved in planning
terrorism are not always well-trained
or equipped, and are more
vulnerable to detection by
employees, passers-by, and others.
DETECTING ADVERSARIAL SURVEILLANCE
• In order to detect surveillance by
adversaries, first you should take
note of activities you observe that
are typically associated with
surveillance, such as watching a
location or recording information
about it over time.
• Next, you should evaluate any
surveillance-related activities that
you observe to determine if they
seem unusual or noteworthy. Often,
you will find that surveillance
activities will appear unusual and out
of place.
DETECTING ADVERSARIAL SURVEILLANCE
(CONTINUED)
• In order to raise awareness, and
emphasize the importance of citizen
reporting, the Department of
Homeland Security launched the “If
You See Something, Say Something”
campaign.
• Illegal or suspicious activities should
be reported to Security and/or local
law enforcement; for investigative
follow-up, and recording.
REPORTING
• When you report suspicious activity
to Security, they will investigate the
event, gather information, look for
any trends or patterns, and decide if
local law enforcement needs to be
notified.
• When suspicious activity is reported
to law enforcement, they will
provide it to a local fusion center for
further review.
WHAT HAPPENS AFTER A REPORT HAS BEEN
MADE?
• Fusion center receive information
from a variety of sources, such as
suspicious activity reports (SARs)
from law enforcement, citizen
reporting, emergency responders,
and other government entities;
including federal partners.
• Qualified analysts at these centers
review the information and decide if
there are any possible links to
potential terrorist attacks, and if the
information meets the criteria for
sharing nationwide.
FUSION CENTERS
• If the information meets the criteria
to be shared nationwide, it is
reported to the Nationwide SAR
Initiative (NSI), and forwarded to the
Federal Bureau of Investigation
(FBI), and law enforcement agencies
across the nation; for investigative
follow-up.
FUSION CENTERS (CONTINUED)

More Related Content

What's hot

Red Flags of Money Laundering
Red Flags of Money LaunderingRed Flags of Money Laundering
Red Flags of Money Laundering
complianceonline123
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
dougfarre
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
Tom Eston
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
Faheem Ul Hasan
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Gopal Choudhary
 
Presentation AML
Presentation AMLPresentation AML
Presentation AML
Mirsazzad
 
PATROLLING
PATROLLINGPATROLLING
PATROLLING
Faheem Ul Hasan
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
 
Fraud Risk
Fraud RiskFraud Risk
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
Physical access control
Physical access controlPhysical access control
Physical access control
Ahsin Yousaf
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
Veriti Consulting LLC
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
SBS AND COMPANY LLP, CHARTERED ACCOUNTANTS
 
Understanding Its Suspicious Activity Reporting (SAR) Requirement
Understanding Its Suspicious Activity Reporting (SAR) RequirementUnderstanding Its Suspicious Activity Reporting (SAR) Requirement
Understanding Its Suspicious Activity Reporting (SAR) Requirement
complianceonline123
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
Felix Jumamoy
 
Interview and interrogation_powerpoint
Interview and interrogation_powerpointInterview and interrogation_powerpoint
Interview and interrogation_powerpoint
Dakota Boswell
 
Cyber security analysis presentation
Cyber security analysis presentationCyber security analysis presentation
Cyber security analysis presentation
Vaibhav R
 
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 

What's hot (20)

Red Flags of Money Laundering
Red Flags of Money LaunderingRed Flags of Money Laundering
Red Flags of Money Laundering
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Presentation AML
Presentation AMLPresentation AML
Presentation AML
 
PATROLLING
PATROLLINGPATROLLING
PATROLLING
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Physical access control
Physical access controlPhysical access control
Physical access control
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Understanding Its Suspicious Activity Reporting (SAR) Requirement
Understanding Its Suspicious Activity Reporting (SAR) RequirementUnderstanding Its Suspicious Activity Reporting (SAR) Requirement
Understanding Its Suspicious Activity Reporting (SAR) Requirement
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Interview and interrogation_powerpoint
Interview and interrogation_powerpointInterview and interrogation_powerpoint
Interview and interrogation_powerpoint
 
Cyber security analysis presentation
Cyber security analysis presentationCyber security analysis presentation
Cyber security analysis presentation
 
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
 

Similar to Suspicious Activity Reporting

Cybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxCybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptx
adnis1
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
Eric Schiowitz
 
Investigation & report writing
Investigation & report writingInvestigation & report writing
Investigation & report writing
Ferdinand Camilo Kimura
 
CRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILEDCRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILED
Amb Steve Mbugua
 
new resume TMilano15
new resume TMilano15new resume TMilano15
new resume TMilano15
Theresa Milano
 
Chapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptxChapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptx
KettyM1
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
Karen Moxley
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
aratibhavsar
 
IQ4 Final Presentation (1)
IQ4 Final Presentation  (1)IQ4 Final Presentation  (1)
IQ4 Final Presentation (1)
Chathura Wickramage
 
Antiterrorism Point of Instruction
Antiterrorism Point of InstructionAntiterrorism Point of Instruction
Antiterrorism Point of Instruction
Caleb Lin, MBA
 
Investigation and Crime Scene Preservation Seminar.pptx
Investigation and Crime Scene Preservation Seminar.pptxInvestigation and Crime Scene Preservation Seminar.pptx
Investigation and Crime Scene Preservation Seminar.pptx
MichaelOnia
 
Internal security and forensic science
Internal security and forensic scienceInternal security and forensic science
Internal security and forensic science
Prashant Mehta
 
Surveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxSurveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptx
itzmerhuzieeee
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt
harshbj1801
 
ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)
Rappahannock Community College
 
When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)
Britton Gallagher
 
International Standards & Action to Combat Money Laundering 11- Legal Aspects...
International Standards & Action to Combat Money Laundering 11- Legal Aspects...International Standards & Action to Combat Money Laundering 11- Legal Aspects...
International Standards & Action to Combat Money Laundering 11- Legal Aspects...
LawrenceMutinda1
 
Police & Forensic Science
Police & Forensic SciencePolice & Forensic Science
Police & Forensic Science
Madona Mathew
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
Shreyas Patel
 
Hunting and Legal Hackback using Cyber Deception
Hunting and Legal Hackback using Cyber DeceptionHunting and Legal Hackback using Cyber Deception
Hunting and Legal Hackback using Cyber Deception
Cymmetria
 

Similar to Suspicious Activity Reporting (20)

Cybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxCybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptx
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
Investigation & report writing
Investigation & report writingInvestigation & report writing
Investigation & report writing
 
CRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILEDCRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILED
 
new resume TMilano15
new resume TMilano15new resume TMilano15
new resume TMilano15
 
Chapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptxChapter 1 Lecture Slides (1).pptx
Chapter 1 Lecture Slides (1).pptx
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
 
IQ4 Final Presentation (1)
IQ4 Final Presentation  (1)IQ4 Final Presentation  (1)
IQ4 Final Presentation (1)
 
Antiterrorism Point of Instruction
Antiterrorism Point of InstructionAntiterrorism Point of Instruction
Antiterrorism Point of Instruction
 
Investigation and Crime Scene Preservation Seminar.pptx
Investigation and Crime Scene Preservation Seminar.pptxInvestigation and Crime Scene Preservation Seminar.pptx
Investigation and Crime Scene Preservation Seminar.pptx
 
Internal security and forensic science
Internal security and forensic scienceInternal security and forensic science
Internal security and forensic science
 
Surveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxSurveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptx
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt
 
ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)
 
When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)
 
International Standards & Action to Combat Money Laundering 11- Legal Aspects...
International Standards & Action to Combat Money Laundering 11- Legal Aspects...International Standards & Action to Combat Money Laundering 11- Legal Aspects...
International Standards & Action to Combat Money Laundering 11- Legal Aspects...
 
Police & Forensic Science
Police & Forensic SciencePolice & Forensic Science
Police & Forensic Science
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
Hunting and Legal Hackback using Cyber Deception
Hunting and Legal Hackback using Cyber DeceptionHunting and Legal Hackback using Cyber Deception
Hunting and Legal Hackback using Cyber Deception
 

Recently uploaded

RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 

Recently uploaded (20)

RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 

Suspicious Activity Reporting

  • 1. - PowerPoint by Jeffery Martin SUSPICIOUS ACTIVITY REPORTING
  • 2. • Both past and recent terror attacks show that events that may seem unrelated may actually be part of a larger plot. • Prior to terrorist acts, the terrorist usually engage in precursor activities; where they make plans, acquire materials, collect information, and commit other criminal acts. • These actions will produce behaviors that may seem suspicious and may provide clues as to what may lie ahead. SUSPICIOUS ACTIVITY
  • 3. • Suspicious activity is defined as “Observed behavior reasonably indicative of preoperational planning, related to terrorism or other criminal activity”. • When thinking about suspicious activity do not focus on “who”; instead focus on “what”. • A persons race, ethnicity, nationality, or religious beliefs do not make a person “suspicious”. • When reporting suspicious activity , focus on the observable behaviors; such as the location of the activity, the timeline of events, and the tools and methods used (cameras, binoculars, fake I.D.s, etc.). WHAT IS SUSPICIOUS ACTIVITY?
  • 4. • A breach, or attempted breach, of a secured area. • A person that is lying about their identity, or trying to use false identification, insignias, or documentation. • Theft, loss, or diversion of materials associated with the facility. • Vandalism of a facility or protected site. • Cyber attacks to attempt to disrupt an organization’s IT systems. • Expressed or implied threats to damage or compromise a facility or structure. • Unusual or dangerous aviation activity in the area, that has been recently interpreted as suspicious; or poses a threat to people or property. • Someone asking for specific facility, operations, or security information. • Testing security systems, by pulling fire alarms, opening doors armed with an alarm, etc. • Storing unusual quantities of materials; such as weapons, chemicals, cell phones, and laptop computers TYPES OF SUSPICIOUS ACTIVITIES
  • 5. • Prior to a terrorist attack or other planned criminal act, the actors usually perform some type of adversarial surveillance. • Adversarial Surveillance is the gathering of information in preparation for an action that is aggressive or criminal in nature. • These actions include domestic and international terrorism, crimes against individuals, espionage, theft, stalking, and destruction of property. ADVERSARIAL SURVEILLANCE
  • 6. • When planning illegal activities – including terrorist attacks or other crimes – perpetrators may conduct surveillance to try to learn all they can about:  The location.  Building access, egress, or vulnerabilities.  Routine activities of employees, suppliers, customers, and visitors.  Security protocols or equipment.  Other relevant information. ADVERSARIAL SURVEILLANCE (CONTINUED)
  • 7. The following types of information can be collected through adversarial surveillance: • Facility layout, including access and egress routes • Locations and numbers of security personnel and cameras • Timing of routine events • Security/visitor processes and procedures • Security equipment, including badges and uniforms • Access requirements for restricted or employee-only areas • Information about maintenance and cleaning personnel or procedures ADVERSARIAL SURVEILLANCE (CONTINUED)
  • 8. • Surveillance is usually the weak point in the planning process for terrorist attacks or other criminal acts. • This is because It takes time, and may involve repeated visits. • Surveillance may take place over several days, weeks, or longer. • Surveillance by highly trained individuals can be hard to detect; however experience has shown us that individuals involved in planning terrorism are not always well-trained or equipped, and are more vulnerable to detection by employees, passers-by, and others. DETECTING ADVERSARIAL SURVEILLANCE
  • 9. • In order to detect surveillance by adversaries, first you should take note of activities you observe that are typically associated with surveillance, such as watching a location or recording information about it over time. • Next, you should evaluate any surveillance-related activities that you observe to determine if they seem unusual or noteworthy. Often, you will find that surveillance activities will appear unusual and out of place. DETECTING ADVERSARIAL SURVEILLANCE (CONTINUED)
  • 10. • In order to raise awareness, and emphasize the importance of citizen reporting, the Department of Homeland Security launched the “If You See Something, Say Something” campaign. • Illegal or suspicious activities should be reported to Security and/or local law enforcement; for investigative follow-up, and recording. REPORTING
  • 11. • When you report suspicious activity to Security, they will investigate the event, gather information, look for any trends or patterns, and decide if local law enforcement needs to be notified. • When suspicious activity is reported to law enforcement, they will provide it to a local fusion center for further review. WHAT HAPPENS AFTER A REPORT HAS BEEN MADE?
  • 12. • Fusion center receive information from a variety of sources, such as suspicious activity reports (SARs) from law enforcement, citizen reporting, emergency responders, and other government entities; including federal partners. • Qualified analysts at these centers review the information and decide if there are any possible links to potential terrorist attacks, and if the information meets the criteria for sharing nationwide. FUSION CENTERS
  • 13. • If the information meets the criteria to be shared nationwide, it is reported to the Nationwide SAR Initiative (NSI), and forwarded to the Federal Bureau of Investigation (FBI), and law enforcement agencies across the nation; for investigative follow-up. FUSION CENTERS (CONTINUED)