Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

What Really is Suspicious Activity?

By Duane Jones
April 11, 2008
Sharing appropriate information among all employees will help people better identity suspicious behavior and go beyond stereotypes. The bottom line: Identify and track people beyond their looks.


Every security program today calls for security personnel and even employees to report “suspicious activity.”

Most security programs have some level of explanation of what they define as suspicious activity; yet it rarely goes beyond providing some bullet lines for security personnel and employees to evaluate.

An unidentified person taking photographs of facility assets certainly falls within the scope of suspicious activity as does someone attempting to breach the perimeter of the facility or gain access without authorization. What is often missing in defining suspicious activities is that many times suspicious activities are not so overt.

Often proprietary and contract security personnel are tasked with watching for activities that may indicate criminal activity or even worse, terrorist activities. The fact that a terrorist organization will most likely conduct surveillance on a facility to evaluate its potential for targeting is commonly understood; but the training on the characteristics of those activities is not taught enough. In most companies security comprises only a small segment of the overall employee population. Yet it is the security personnel that are expected to detect suspicious activities alone.

GO BEYOND STEREOTYPES

Chief security officers are missing a great opportunity at enhancing security effectiveness when they do not engage and train all employees to recognize suspicious activities. The understanding of what constitutes suspicious activities and what should be recognized as an indicator of suspicious activity must also be taught.

CSOs may not be using assets effectively if they fail to teach how an adversary operates. The belief that security personnel will automatically recognize suspicious activity is a myth.

The understanding of the components of suspicious activities as it relates to the terrorist threat requires that everyone – to some degree -- learn the methods of the terrorist. The Al Qaeda Manual (hereafter referred to as the “manual”) should be an excellent resource for every security professional and security manager in the United States and abroad. The training and methods of operations provided in this document clearly show that normal security processes will more than likely not be able to detect true intelligence operations by a terrorist cell. Reading the chapters of this manual clearly shows that defining suspicious activities goes well beyond our normal interpretations.

One of the biggest mistakes security officials can make it to stereotype the threat.

If looking for a “Middle Eastern looking male” to fit the profile every time, then security is setting itself up for failure. First, the average “Middle Eastern looking male” probably assumes to many of a person with a long beard. However, the manual trains members not to have a beard or carry the Koran. The manual continually strives to teach members that they must take steps to reduce any suspicions of either their identities or their true intentions. Stereotyping based on appearances may overlook true suspicious activities.

UNDERSTAND THE ENEMY’S MO

The manual also trains members on specific considerations of the vehicles they use in their activities. During intelligence collection, members are instructed to use vehicles that are basically nondescript in appearance. Recognizing suspicious activities from this point is almost impossible but there are certain characteristics that could be identified.

As screenings or inspections of vehicles is commonplace, and required at Maritime Transportation Security Act of 2002 facilities that are regulated by the U.S. Coast Guard, there are some training points in the manual that may point to suspicious activities.

For example, members are taught to disable the interior light of their vehicle so that detection is limited when opening vehicle doors. Screenings designed to recognize these characteristics should be part of the definitions of suspicious activities. Also, during screenings, employees should look for “props” that are placed by the member in an attempt to establish their story or cover for their activities. Being aware that props could be used is important in evaluating whether suspicious activities are actually occurring. In the case of the Fort Dix “want-to-be terrorists,” they revealed that the use of a camera phone offered them not only the opportunity to capture images but also the means to rapidly delete the images in the event they were stopped by law enforcement.

Within the normal office environment, most employees are oblivious to the potential for suspicious activities.

GET ALL EMPLOYEES INVOLVED

The potential for “force multiplication” exists though in every work environment but it begins with education. Engaging employees to recognize and report suspicious activities not only serves to deter operational activities by a terrorist organization but it can also be effective in deterring other types of crime. Employees that are taught to understand the indicators and report activities can greatly reduce the impacts of crime. For example, probably every one of us has received a telephone call where the caller asks a question that afterwards leaves us wondering why he or she asked that question. The question can be as simple as “what time do you close” or “is Mr. Smith in today.”

How often do we answer these questions without either finding out who is asking for the information or why they need the requested information? While the questions may be innocent, there is also the potential that someone wants to know when the office will be empty and specifically if Mr. Smith is in the office today. Teaching employees the value of information is important in deterring suspicious activities.

Defining suspicious activities certainly includes many overt activities that may occur but we must also understand that those activities generally will not be so obvious. Training our employees and security personnel to understand that the threat is more advanced than we want to believe is critical to enhancing our security efforts. In order to be able to report suspicious activities, we must be able to understand truly how the adversary operates. Sharing awareness information with all employees is one step that not only shows there is a continued threat but it also engages every employee in the security program.

The ultimate goal should be that each company has every employee with an ability to report suspicious activities, not just the security force.  

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Duane Jones, owner of SecurityAwarenessToday, has over 30 years experience in security management and counterintelligence operations. Jones served as a Special Agent (U.S. Army) and Director of Security for a Fortune 500 company.  Jones holds a M.S. in Security Management from Bellevue University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • insider threat awareness and mitigation

    Improving insider threat awareness

    See More
  • Low Cost Security Tools: Employee Awareness

    See More
  • Can Copper Theft be Prevented?

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!