To: tang-soo
Thanks! I was able to open the little attachment thing and found this:
This Page Isn’t Available
The link may be broken, or the page may have been removed. Check to see if the link you’re trying to open is correct.
I really appreciate you trying!
1,922 posted on
09/18/2022 12:32:32 PM PDT by
blu
(Bagster's ping on the side oh, and FJB!)
To: blu
I will just post the text.
Recognize Suspicious Activity What is Suspicious Activity?
Suspicious activity is any observed behavior that may indicate pre-operational planning associated with terrorism or terrorism-related crime. With the help of the Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI), the U.S. Department of Homeland Security has identified common signs of terrorism-related suspicious activity. Some activities could be innocent, but trained law enforcement officials can determine whether the behavior warrants further action.
Remember: Factors such as race, ethnicity, gender, national origin, religion, sexual orientation, or gender identity are not suspicious. A cornerstone of the DHS mission is ensuring that people’s civil rights and civil liberties are not diminished by our security efforts, activities, and programs. As such, the DHS “If You See Something, Say Something®” campaign encourages the public to report only suspicious behavior and situations (e.g., someone breaking into a restricted area), rather than one’s appearance, to authorities.
Whether you are on your way to work, shopping at a store, or traveling on vacation, remember: We all play a role in keeping our communities safe. Remember to stay alert and say something when you see something suspicious.
Expressed or Implied Threat
Threatening to commit a crime that could harm or kill people or damage a facility, infrastructure, or secured site.
Surveillance
A prolonged interest in or taking pictures/videos of personnel, facilities, security features, or infrastructure in an unusual or covert manner.
Theft/Loss/Diversion
Stealing or diverting items—such as equipment, uniforms, or badges—that belong to a facility or secured site.
Testing or Probing of Security
Investigating or testing a facility’s security or IT systems to assess the strength or weakness of the target.
Aviation Activity
Operating or interfering with the operation of an aircraft that poses a threat of harm to people and property.
Breach/Attempted Intrusion
Unauthorized people trying to enter a restricted area or impersonating authorized personnel.
Acquisition of Expertise
Gaining skills or knowledge on a specific topic, such as facility security, military tactics, or flying an aircraft.
Eliciting Information
Questioning personnel beyond mere curiosity about an event, facility, or operations.
Misrepresentation
Presenting false information or misusing documents to conceal possible illegal activity.
Cyberattack
Disrupting or compromising an organization’s information technology systems.
Recruiting/Financing
Funding suspicious or criminal activity or recruiting people to participate in criminal or terrorist activity.
Sabotage/Tampering /Vandalism
Damaging or destroying part of a facility, infrastructure, or secured site.
Materials Acquisition/Storage
Acquisition and/or storage of unusual materials such as cell phones, radio controllers, or toxic materials.
Weapons Collection/Storage
Collection or discovery of unusual amounts of weapons including explosives, chemicals, or other destructive materials.
Sector-Specific Incident
Actions which raise concern to specific sectors (e.g., power plant) with regard to their personnel, facilities, systems, or functions.
1,926 posted on
09/18/2022 12:55:32 PM PDT by
tang-soo
(Prophecy of the Seventy Weeks - Read Daniel Chapter 9)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson