Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

What Is Suspicious?

By Bruce Mandelblit
October 1, 2005
Years after the horrendous events of Sept 11, we have received numerous and harsh reminders that malicious terrorists are still enormously active in trying to disrupt democracies worldwide. Recently, for example, over 50 innocent London commuters were slaughtered by a series of four cowardly suicide attacks.

Those of us in the security and law enforcement fields have a crucial duty to try to prevent, or at least mitigate, any potential acts of terrorism.

Some of the tools we have at our disposal include our specialized training and real-life experiences that may help us determine whether or not a person, item or activity is suspicious.

Here are, according to the Pennsylvania Homeland Security Web site, possible indicators of suspicious activities, items and persons as they relate to terrorism.

Checklist for Suspicious Persons

  • An unidentified individual observed loitering near a facility or in the lobby of a facility for an extended period of time.

    ? An unidentified individual observed wandering throughout a facility.

    ? An unidentified individual dressed in oversized or inappropriate clothing (e.g. a long heavy coat in warm weather) that appears to be concealing something.

  • An unidentified individual entering a facility carrying an oversized backpack or a large suitcase.

  • An individual in a facility with no visible company issued identification.

  • An individual who, when challenged by a supervisor or an employee, does not respond or does not provide a reasonable explanation for his/her actions.

  • An unidentified individual asking specific questions about your facility (e.g. security related matters, etc.).

  • An unidentified individual asking questions about key agency personnel (e.g., their normal arrival or departure times, their vehicle, location of their parking space, etc.).

  • An unidentified individual trying to deliver a package or other item to an office or to a specific person.

  • An unidentified individual observed photographing, videotaping and/or sketching the exterior or interior of any state facility.

  • An individual without proper identification entering your facility claiming to be a contractor, law enforcement officer, reporter or a service technician.



Checklist for Suspicious Activity

  • Two or more unidentified individuals observed loitering near a facility or in the lobby of a facility.

  • Individuals or groups who are uncooperative if challenged by a representative of that company/ security or an employee.

  • Individuals or groups who appear at your facility without prior notification or clearance and claim to be contractors or service technicians.

  • Unidentified individuals attempting to deliver packages or other items to an office or to a specific person.

  • Unidentified individuals attempting to remove property from an office or a facility without proper authorization.

  • Unidentified individuals who appear to be conducting surveillance of a facility (e.g. sitting in a vehicle for an extended period of time and/or taking photographs or videotaping, etc.).

  • An unidentified individual observed placing an object or a package outside a facility and departing the area.



Checklist for Suspicious Items or Vehicles

  • Any unattended backpacks, boxes, containers, luggage and/or packages in an elevator, hallway, lobby, restroom, snack bar or stairwell of your facility.

  • Any item that could be an improvised explosive device (e.g. items with visible wires, antennas, batteries, timing devices, metal or plastic pipe with each end capped or covered, etc.). NOTE: Untrained personnel should not examine or move a possible improvised explosive device; the area must be cleared pending the arrival of bomb squad personnel. Contact law enforcement immediately.

  • Rental vehicles/trailers parked near a facility, parked at or near the loading dock, or located in the parking lot without prior authorization.

    ? Any vehicle that appears to be overloaded or has any substance leaking from it.

  • Any vehicle parked illegally or parked at an unusual location.

  • Any type of vehicle that appears to be abandoned (e.g. inspection sticker expired or missing, registration plate expired or missing, etc.).



Reporting Procedures for Suspicious Persons and Activities:

If you observe a suspicious person or persons, a suspicious item or a suspicious vehicle, you should immediately report the information to the appropriate law enforcement agency.

Non-emergency tips should be called immediately to your area’s appropriate tip line and/or e-mail address.

For an emergency or an imminent event immediately report it to 911 or the local law enforcement agency, if known.

You should be prepared to provide your name, location and call-back number.

You should be prepared to explain exactly what type of emergency is being reported.

You should be prepared to stay on the line with the call taker and to answer the call taker’s questions to the best of his/her ability; the call taker should terminate the call.

You might be requested to meet with the first responder to answer his/her questions and to direct the officer to the correct location.

For more information on suspicious persons, items and activities, log on to www.homelandsecurity.state.pa.us or contact your local law enforcement agency.

Final Thoughts

Of course, the majority of possible suspicious persons and activities turn out to have nothing to do with terrorism, or even a criminal act. Everything that we observe must be viewed through the looking glass of the totality of the circumstances.

Sidebar: It's a Dog's World to Sniff Suspicious

It may turn out that dogs are better at identifying terrorists and criminals than people. One example: Crazy Joe (pictured) is a detector dog for the Department of Homeland Security, Customs and Border Patrol. Dogs also provide guard and detection service in Iraq and Afghanistan. For example, Army Sergeant Herman Haynes and his German Shepherd, Frenke, have distinguished themselves through exceptional service in Afghanistan and Iraq. They were recently honored with the “Heroic Military Working Dog Award” from American Kennel Club Chairman Ronald Menaker. The AKC raises funds to support canine search and rescue organizations throughout the U.S. Dogs played an essential role in Katrina search, rescue and recovery operations. Photo courtesy: PRNewsFoto

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bruce is the director of security for a large Central Florida resort, as well as a highly decorated Reserve Deputy Sheriff with a major law enforcement agency.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Spotting the Suspicious

    See More
  • What Really is Suspicious Activity?

    See More
  • Identity Theft: A New Security Challenge

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing