Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

What Is Suspicious?

By Bruce Mandelblit
October 1, 2005
Years after the horrendous events of Sept 11, we have received numerous and harsh reminders that malicious terrorists are still enormously active in trying to disrupt democracies worldwide. Recently, for example, over 50 innocent London commuters were slaughtered by a series of four cowardly suicide attacks.

Those of us in the security and law enforcement fields have a crucial duty to try to prevent, or at least mitigate, any potential acts of terrorism.

Some of the tools we have at our disposal include our specialized training and real-life experiences that may help us determine whether or not a person, item or activity is suspicious.

Here are, according to the Pennsylvania Homeland Security Web site, possible indicators of suspicious activities, items and persons as they relate to terrorism.

Checklist for Suspicious Persons

  • An unidentified individual observed loitering near a facility or in the lobby of a facility for an extended period of time.

    ? An unidentified individual observed wandering throughout a facility.

    ? An unidentified individual dressed in oversized or inappropriate clothing (e.g. a long heavy coat in warm weather) that appears to be concealing something.

  • An unidentified individual entering a facility carrying an oversized backpack or a large suitcase.

  • An individual in a facility with no visible company issued identification.

  • An individual who, when challenged by a supervisor or an employee, does not respond or does not provide a reasonable explanation for his/her actions.

  • An unidentified individual asking specific questions about your facility (e.g. security related matters, etc.).

  • An unidentified individual asking questions about key agency personnel (e.g., their normal arrival or departure times, their vehicle, location of their parking space, etc.).

  • An unidentified individual trying to deliver a package or other item to an office or to a specific person.

  • An unidentified individual observed photographing, videotaping and/or sketching the exterior or interior of any state facility.

  • An individual without proper identification entering your facility claiming to be a contractor, law enforcement officer, reporter or a service technician.



Checklist for Suspicious Activity

  • Two or more unidentified individuals observed loitering near a facility or in the lobby of a facility.

  • Individuals or groups who are uncooperative if challenged by a representative of that company/ security or an employee.

  • Individuals or groups who appear at your facility without prior notification or clearance and claim to be contractors or service technicians.

  • Unidentified individuals attempting to deliver packages or other items to an office or to a specific person.

  • Unidentified individuals attempting to remove property from an office or a facility without proper authorization.

  • Unidentified individuals who appear to be conducting surveillance of a facility (e.g. sitting in a vehicle for an extended period of time and/or taking photographs or videotaping, etc.).

  • An unidentified individual observed placing an object or a package outside a facility and departing the area.



Checklist for Suspicious Items or Vehicles

  • Any unattended backpacks, boxes, containers, luggage and/or packages in an elevator, hallway, lobby, restroom, snack bar or stairwell of your facility.

  • Any item that could be an improvised explosive device (e.g. items with visible wires, antennas, batteries, timing devices, metal or plastic pipe with each end capped or covered, etc.). NOTE: Untrained personnel should not examine or move a possible improvised explosive device; the area must be cleared pending the arrival of bomb squad personnel. Contact law enforcement immediately.

  • Rental vehicles/trailers parked near a facility, parked at or near the loading dock, or located in the parking lot without prior authorization.

    ? Any vehicle that appears to be overloaded or has any substance leaking from it.

  • Any vehicle parked illegally or parked at an unusual location.

  • Any type of vehicle that appears to be abandoned (e.g. inspection sticker expired or missing, registration plate expired or missing, etc.).



Reporting Procedures for Suspicious Persons and Activities:

If you observe a suspicious person or persons, a suspicious item or a suspicious vehicle, you should immediately report the information to the appropriate law enforcement agency.

Non-emergency tips should be called immediately to your area’s appropriate tip line and/or e-mail address.

For an emergency or an imminent event immediately report it to 911 or the local law enforcement agency, if known.

You should be prepared to provide your name, location and call-back number.

You should be prepared to explain exactly what type of emergency is being reported.

You should be prepared to stay on the line with the call taker and to answer the call taker’s questions to the best of his/her ability; the call taker should terminate the call.

You might be requested to meet with the first responder to answer his/her questions and to direct the officer to the correct location.

For more information on suspicious persons, items and activities, log on to www.homelandsecurity.state.pa.us or contact your local law enforcement agency.

Final Thoughts

Of course, the majority of possible suspicious persons and activities turn out to have nothing to do with terrorism, or even a criminal act. Everything that we observe must be viewed through the looking glass of the totality of the circumstances.

Sidebar: It's a Dog's World to Sniff Suspicious

It may turn out that dogs are better at identifying terrorists and criminals than people. One example: Crazy Joe (pictured) is a detector dog for the Department of Homeland Security, Customs and Border Patrol. Dogs also provide guard and detection service in Iraq and Afghanistan. For example, Army Sergeant Herman Haynes and his German Shepherd, Frenke, have distinguished themselves through exceptional service in Afghanistan and Iraq. They were recently honored with the “Heroic Military Working Dog Award” from American Kennel Club Chairman Ronald Menaker. The AKC raises funds to support canine search and rescue organizations throughout the U.S. Dogs played an essential role in Katrina search, rescue and recovery operations. Photo courtesy: PRNewsFoto

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bruce is the director of security for a large Central Florida resort, as well as a highly decorated Reserve Deputy Sheriff with a major law enforcement agency.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Spotting the Suspicious

    See More
  • Identity Theft: A New Security Challenge

    See More
  • The Latest Tools of the Trade For Front Line Security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!