Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

What Is Suspicious?

By Bruce Mandelblit
October 1, 2005
Years after the horrendous events of Sept 11, we have received numerous and harsh reminders that malicious terrorists are still enormously active in trying to disrupt democracies worldwide. Recently, for example, over 50 innocent London commuters were slaughtered by a series of four cowardly suicide attacks.

Those of us in the security and law enforcement fields have a crucial duty to try to prevent, or at least mitigate, any potential acts of terrorism.

Some of the tools we have at our disposal include our specialized training and real-life experiences that may help us determine whether or not a person, item or activity is suspicious.

Here are, according to the Pennsylvania Homeland Security Web site, possible indicators of suspicious activities, items and persons as they relate to terrorism.

Checklist for Suspicious Persons

  • An unidentified individual observed loitering near a facility or in the lobby of a facility for an extended period of time.

    ? An unidentified individual observed wandering throughout a facility.

    ? An unidentified individual dressed in oversized or inappropriate clothing (e.g. a long heavy coat in warm weather) that appears to be concealing something.

  • An unidentified individual entering a facility carrying an oversized backpack or a large suitcase.

  • An individual in a facility with no visible company issued identification.

  • An individual who, when challenged by a supervisor or an employee, does not respond or does not provide a reasonable explanation for his/her actions.

  • An unidentified individual asking specific questions about your facility (e.g. security related matters, etc.).

  • An unidentified individual asking questions about key agency personnel (e.g., their normal arrival or departure times, their vehicle, location of their parking space, etc.).

  • An unidentified individual trying to deliver a package or other item to an office or to a specific person.

  • An unidentified individual observed photographing, videotaping and/or sketching the exterior or interior of any state facility.

  • An individual without proper identification entering your facility claiming to be a contractor, law enforcement officer, reporter or a service technician.



Checklist for Suspicious Activity

  • Two or more unidentified individuals observed loitering near a facility or in the lobby of a facility.

  • Individuals or groups who are uncooperative if challenged by a representative of that company/ security or an employee.

  • Individuals or groups who appear at your facility without prior notification or clearance and claim to be contractors or service technicians.

  • Unidentified individuals attempting to deliver packages or other items to an office or to a specific person.

  • Unidentified individuals attempting to remove property from an office or a facility without proper authorization.

  • Unidentified individuals who appear to be conducting surveillance of a facility (e.g. sitting in a vehicle for an extended period of time and/or taking photographs or videotaping, etc.).

  • An unidentified individual observed placing an object or a package outside a facility and departing the area.



Checklist for Suspicious Items or Vehicles

  • Any unattended backpacks, boxes, containers, luggage and/or packages in an elevator, hallway, lobby, restroom, snack bar or stairwell of your facility.

  • Any item that could be an improvised explosive device (e.g. items with visible wires, antennas, batteries, timing devices, metal or plastic pipe with each end capped or covered, etc.). NOTE: Untrained personnel should not examine or move a possible improvised explosive device; the area must be cleared pending the arrival of bomb squad personnel. Contact law enforcement immediately.

  • Rental vehicles/trailers parked near a facility, parked at or near the loading dock, or located in the parking lot without prior authorization.

    ? Any vehicle that appears to be overloaded or has any substance leaking from it.

  • Any vehicle parked illegally or parked at an unusual location.

  • Any type of vehicle that appears to be abandoned (e.g. inspection sticker expired or missing, registration plate expired or missing, etc.).



Reporting Procedures for Suspicious Persons and Activities:

If you observe a suspicious person or persons, a suspicious item or a suspicious vehicle, you should immediately report the information to the appropriate law enforcement agency.

Non-emergency tips should be called immediately to your area’s appropriate tip line and/or e-mail address.

For an emergency or an imminent event immediately report it to 911 or the local law enforcement agency, if known.

You should be prepared to provide your name, location and call-back number.

You should be prepared to explain exactly what type of emergency is being reported.

You should be prepared to stay on the line with the call taker and to answer the call taker’s questions to the best of his/her ability; the call taker should terminate the call.

You might be requested to meet with the first responder to answer his/her questions and to direct the officer to the correct location.

For more information on suspicious persons, items and activities, log on to www.homelandsecurity.state.pa.us or contact your local law enforcement agency.

Final Thoughts

Of course, the majority of possible suspicious persons and activities turn out to have nothing to do with terrorism, or even a criminal act. Everything that we observe must be viewed through the looking glass of the totality of the circumstances.

Sidebar: It's a Dog's World to Sniff Suspicious

It may turn out that dogs are better at identifying terrorists and criminals than people. One example: Crazy Joe (pictured) is a detector dog for the Department of Homeland Security, Customs and Border Patrol. Dogs also provide guard and detection service in Iraq and Afghanistan. For example, Army Sergeant Herman Haynes and his German Shepherd, Frenke, have distinguished themselves through exceptional service in Afghanistan and Iraq. They were recently honored with the “Heroic Military Working Dog Award” from American Kennel Club Chairman Ronald Menaker. The AKC raises funds to support canine search and rescue organizations throughout the U.S. Dogs played an essential role in Katrina search, rescue and recovery operations. Photo courtesy: PRNewsFoto

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bruce is the director of security for a large Central Florida resort, as well as a highly decorated Reserve Deputy Sheriff with a major law enforcement agency.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Spotting the Suspicious

    See More
  • What Really is Suspicious Activity?

    See More
  • Identity Theft: A New Security Challenge

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing