Suspicious behavior
Suspicious behavior may suggest terrorism or related criminal planning. The Nationwide Suspicious Activity Reporting (SAR) Initiative aids the U.S. Department of Homeland Security (DHS) in identifying such activities. Although some behaviors might be harmless, law enforcement is trained to evaluate and decide on the necessity of further investigation.
Suspicious activity should be judged on behavior, not personal characteristics like race, ethnicity, or gender. It's a fundamental principle that security efforts, such as the "If You See Something, Say Something®" initiative, should not compromise civil rights and liberties. Reporting should focus on actions, like unauthorized access to restricted areas, rather than on appearances.
Reporting suspicious behavior
Maintaining public safety is a shared duty. If you observe any suspicious behavior, promptly inform local law enforcement or an authority figure. Numerous states have established specific "tip lines" for reporting activities that might be related to terrorism. To find the correct contact number for your area, visit the "Report Suspicious Activity" page and use the provided interactive map.
Indicators of suspicious behavior
No matter where you are—heading to work, shopping, or on vacation—it's crucial to remain vigilant. Everyone has a part in ensuring community safety. Always be aware of your surroundings and report any behavior that seems suspicious, particularly if it could suggest a threat of terrorism.
Be aware of behaviors that may signal potential security threats, including:
- Expressed or Implied Threat: Indicating intent to harm through verbal or written messages.
- Observation/Surveillance: Uncommonly detailed attention to a facility or location.
- Photography: Covertly capturing images or videos of sensitive areas or security features.
- Theft/Loss/Diversion: Misappropriating items from secured environments.
- Testing of Security: Assessing the robustness of security setups.
- Aviation Activity: Activities that compromise aircraft safety.
- Breach/Attempted Intrusion: Unauthorized entry into secure zones.
- Misrepresentation: Falsifying information or identity to obscure activities.
- Eliciting Information: Probing questions beyond general curiosity about secure operations.
- Acquisition of Expertise: Learning skills pertinent to executing criminal acts.
- Cyberattack: Targeting IT infrastructure to disrupt operations.
- Recruiting/Financing: Sourcing funds or personnel for criminal endeavors.
- Sabotage/Tampering/Vandalism: Intentionally damaging property or infrastructure.
- Materials Acquisition/Storage: Gathering or storing unusual or hazardous substances.
- Weapons Collection/Storage: Amassing arms or explosive materials.
- Sector-Specific Incident: Conduct raising alarms within a specific sector or industry.