Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Spotting the Suspicious

By Bruce Mandelblit
February 1, 2005
The EnGenius Wireless Enhanced Mobile Emergency Communications portable system links satellite, cellular and landline phone access to keep emergency and other personnel in constant contact.
Local law enforcement and private security will likely be among the first responders to any potential terrorist attack, so it is imperative that these essential folks are aware of any suspicious activity or behavior.

But exactly what characterizes “suspicious behavior” or “suspicious activity” as it relates to terrorism? Here are some suggestions, according to the FBI:

Certain kinds of activities can indicate terrorist plans that are in the works, especially when they occur at or near high profile sites or places where large numbers of people gather such as government buildings, military facilities, utilities, bus and train stations or major public events. Quick reporting is essential. That may mean reporting to the closest Joint Terrorist Task Force, located in a local FBI field office.

SURVEILLANCE: Are you aware of anyone video recording or monitoring activities, taking notes, using cameras, maps, binoculars, etc., near key facilities/events?

SUSPICIOUS QUESTIONING: Are you aware of anyone attempting to gain information in person, by phone, mail, email, etc., regarding a key facility or people who work there?

TESTS OF SECURITY: Are you aware of any attempts to penetrate or test physical security or procedures at a key facility/event?

ACQUIRING SUPPLIES: Are you aware of anyone attempting to improperly acquire explosives, weapons, ammunition, dangerous chemicals, uniforms, badges, flight manuals, access cards or identification for a key facility/event or to legally obtain items under suspicious circumstances that could be used in a terrorist attack?

SUSPICIOUS PERSONS: Are you aware of anyone who does not appear to belong in the workplace, neighborhood, business establishment or near a key facility/event?

DRY RUNS: Have you observed any behavior that appears to be preparation for a terrorist act, such as mapping out routes, playing out scenarios with other people, monitoring key facilities/events, timing traffic lights or traffic flow or other suspicious activities?

DEPLOYING ASSETS: Have you observed abandoned vehicles, stockpiling of suspicious materials or persons being deployed near a key facility/event?

If it’s yes to any of the above, or observed suspicious activity that may relate to terrorism, contact the Joint Terrorist Task Force or law enforcement/counter terrorism agency closest to you immediately. Any tips could save the lives of innocent people. For more information, log on to www.fbi.gov.

And be assured that law enforcement and counter terror agencies are getting better at not only responding to threats but also coordinating communications following viable terror tips.

For example, there now are digital video radio link systems that can be body-mounted or in unpiloted aircraft. One product called Manpack allows personnel on foot to simultaneously transmit high resolution video, audio and an RS232 data stream. One to one radio links and range extension through digital repeaters were integrated in the design from the outset. The complete encoding and RF electronics of the Manpack is housed in a package that is physically similar to a videocassette case.

Deployment will be particularly successful in city environments where there are high levels of radio related clutter that would normally make conventional video link reception “difficult” or operationally unusable.

Another new product is really a portable system that links satellite, cellular and landline phone access to keep emergency and other personnel in constant contact.

Final thoughts

Regardless of how many federal, state and local law enforcement officers are on duty trying to prevent a possible terrorist attack, they rely on private security and the general public to be their extra eyes and ears. We must all have what is called by the police community “situational awareness.” It is fundamental, in other words, that people, including those in the private security field, be aware of their surroundings and try to take notice of anything or anyone that is suspicious, acting unusual or is out of place.

Only by law enforcement, private security and the general public working together can we truly enhance our homeland security and build a strong deterrence.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bruce is the director of security for a large Central Florida resort, as well as a highly decorated Reserve Deputy Sheriff with a major law enforcement agency.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • What Is Suspicious?

    See More
  • The Latest Tools of the Trade For Front Line Security

    See More
  • The Uproar Over RFID

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing