Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: tang-soo

Thanks! I was able to open the little attachment thing and found this:
This Page Isn’t Available
The link may be broken, or the page may have been removed. Check to see if the link you’re trying to open is correct.

I really appreciate you trying!


1,922 posted on 09/18/2022 12:32:32 PM PDT by blu (Bagster's ping on the side oh, and FJB!)
[ Post Reply | Private Reply | To 1919 | View Replies ]


To: blu
I will just post the text.

Recognize Suspicious Activity What is Suspicious Activity?

Suspicious activity is any observed behavior that may indicate pre-operational planning associated with terrorism or terrorism-related crime. With the help of the Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI), the U.S. Department of Homeland Security has identified common signs of terrorism-related suspicious activity. Some activities could be innocent, but trained law enforcement officials can determine whether the behavior warrants further action.

Remember: Factors such as race, ethnicity, gender, national origin, religion, sexual orientation, or gender identity are not suspicious. A cornerstone of the DHS mission is ensuring that people’s civil rights and civil liberties are not diminished by our security efforts, activities, and programs. As such, the DHS “If You See Something, Say Something®” campaign encourages the public to report only suspicious behavior and situations (e.g., someone breaking into a restricted area), rather than one’s appearance, to authorities.

Whether you are on your way to work, shopping at a store, or traveling on vacation, remember: We all play a role in keeping our communities safe. Remember to stay alert and say something when you see something suspicious.

Expressed or Implied Threat

Threatening to commit a crime that could harm or kill people or damage a facility, infrastructure, or secured site.

Surveillance

A prolonged interest in or taking pictures/videos of personnel, facilities, security features, or infrastructure in an unusual or covert manner.

Theft/Loss/Diversion

Stealing or diverting items—such as equipment, uniforms, or badges—that belong to a facility or secured site.

Testing or Probing of Security

Investigating or testing a facility’s security or IT systems to assess the strength or weakness of the target.

Aviation Activity

Operating or interfering with the operation of an aircraft that poses a threat of harm to people and property.

Breach/Attempted Intrusion

Unauthorized people trying to enter a restricted area or impersonating authorized personnel.

Acquisition of Expertise

Gaining skills or knowledge on a specific topic, such as facility security, military tactics, or flying an aircraft.

Eliciting Information

Questioning personnel beyond mere curiosity about an event, facility, or operations.

Misrepresentation

Presenting false information or misusing documents to conceal possible illegal activity.

Cyberattack

Disrupting or compromising an organization’s information technology systems.

Recruiting/Financing

Funding suspicious or criminal activity or recruiting people to participate in criminal or terrorist activity.

Sabotage/Tampering /Vandalism

Damaging or destroying part of a facility, infrastructure, or secured site.

Materials Acquisition/Storage

Acquisition and/or storage of unusual materials such as cell phones, radio controllers, or toxic materials.

Weapons Collection/Storage

Collection or discovery of unusual amounts of weapons including explosives, chemicals, or other destructive materials.

Sector-Specific Incident

Actions which raise concern to specific sectors (e.g., power plant) with regard to their personnel, facilities, systems, or functions.
1,926 posted on 09/18/2022 12:55:32 PM PDT by tang-soo (Prophecy of the Seventy Weeks - Read Daniel Chapter 9)
[ Post Reply | Private Reply | To 1922 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson