Business

Be alert to suspicious customer activity:

Surveillance and probing of potential targets

  • Unusual or prolonged interest in security measures or personnel, entry points and access controls or perimeter barriers such as fences or walls.
  • Unusual behavior such as staring or quickly looking away from personnel or vehicles entering or leaving designed facilities or parking areas.
  • Observation of security reaction drills or procedures.
  • Increase in anonymous telephone or e-mail threats to facilities in conjunction with suspected surveillance incidents - indicating possible surveillance of threat reaction procedures.
  • Foot surveillance involving two or three individuals working together.
  • Mobile surveillance using bicycles, scooters, motorcycles, cars, trucks, sport utility vehicles, limousines, boats or small aircraft.
  • Prolonged static surveillance using operatives disguised as panhandlers, shoe shiners, food or flower vendors, news agents or street sweepers not previously seen in the area.
  • Discreet use of still cameras, video recorders, or note taking at non-tourist locations.
  • Use of multiple sets of clothing and identification or the use of sketching materials (paper, pencils, etc.).
  • Questioning of security or facility personnel.
     
The following indicators may suggest logistical planning for terrorist attack:
  • Attempts to gain sensitive information regarding key facilities or personnel through personal contact or by telephone, mail or e-mail.
  • Attempts to penetrate or test physical security or security response procedures at key facilities.
  • Attempts to improperly acquire explosives, weapons, ammunition, dangerous chemicals, flight manuals or other materials which could be used in a terrorist attack.