Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Spotting the Suspicious

By Bruce Mandelblit
February 1, 2005
The EnGenius Wireless Enhanced Mobile Emergency Communications portable system links satellite, cellular and landline phone access to keep emergency and other personnel in constant contact.
Local law enforcement and private security will likely be among the first responders to any potential terrorist attack, so it is imperative that these essential folks are aware of any suspicious activity or behavior.

But exactly what characterizes “suspicious behavior” or “suspicious activity” as it relates to terrorism? Here are some suggestions, according to the FBI:

Certain kinds of activities can indicate terrorist plans that are in the works, especially when they occur at or near high profile sites or places where large numbers of people gather such as government buildings, military facilities, utilities, bus and train stations or major public events. Quick reporting is essential. That may mean reporting to the closest Joint Terrorist Task Force, located in a local FBI field office.

SURVEILLANCE: Are you aware of anyone video recording or monitoring activities, taking notes, using cameras, maps, binoculars, etc., near key facilities/events?

SUSPICIOUS QUESTIONING: Are you aware of anyone attempting to gain information in person, by phone, mail, email, etc., regarding a key facility or people who work there?

TESTS OF SECURITY: Are you aware of any attempts to penetrate or test physical security or procedures at a key facility/event?

ACQUIRING SUPPLIES: Are you aware of anyone attempting to improperly acquire explosives, weapons, ammunition, dangerous chemicals, uniforms, badges, flight manuals, access cards or identification for a key facility/event or to legally obtain items under suspicious circumstances that could be used in a terrorist attack?

SUSPICIOUS PERSONS: Are you aware of anyone who does not appear to belong in the workplace, neighborhood, business establishment or near a key facility/event?

DRY RUNS: Have you observed any behavior that appears to be preparation for a terrorist act, such as mapping out routes, playing out scenarios with other people, monitoring key facilities/events, timing traffic lights or traffic flow or other suspicious activities?

DEPLOYING ASSETS: Have you observed abandoned vehicles, stockpiling of suspicious materials or persons being deployed near a key facility/event?

If it’s yes to any of the above, or observed suspicious activity that may relate to terrorism, contact the Joint Terrorist Task Force or law enforcement/counter terrorism agency closest to you immediately. Any tips could save the lives of innocent people. For more information, log on to www.fbi.gov.

And be assured that law enforcement and counter terror agencies are getting better at not only responding to threats but also coordinating communications following viable terror tips.

For example, there now are digital video radio link systems that can be body-mounted or in unpiloted aircraft. One product called Manpack allows personnel on foot to simultaneously transmit high resolution video, audio and an RS232 data stream. One to one radio links and range extension through digital repeaters were integrated in the design from the outset. The complete encoding and RF electronics of the Manpack is housed in a package that is physically similar to a videocassette case.

Deployment will be particularly successful in city environments where there are high levels of radio related clutter that would normally make conventional video link reception “difficult” or operationally unusable.

Another new product is really a portable system that links satellite, cellular and landline phone access to keep emergency and other personnel in constant contact.

Final thoughts

Regardless of how many federal, state and local law enforcement officers are on duty trying to prevent a possible terrorist attack, they rely on private security and the general public to be their extra eyes and ears. We must all have what is called by the police community “situational awareness.” It is fundamental, in other words, that people, including those in the private security field, be aware of their surroundings and try to take notice of anything or anyone that is suspicious, acting unusual or is out of place.

Only by law enforcement, private security and the general public working together can we truly enhance our homeland security and build a strong deterrence.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bruce is the director of security for a large Central Florida resort, as well as a highly decorated Reserve Deputy Sheriff with a major law enforcement agency.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • What Is Suspicious?

    See More
  • The Latest Tools of the Trade For Front Line Security

    See More
  • The Uproar Over RFID

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • The Complete Guide to Physical Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing