Full Text
N a t i o n w i d e S A R I n i t i a t i v e NSI N a t i o n w i d e S A R I n i t i a t i v e NSI Tools for and Investigators Suspicious Activity Reporting Indicators and Behaviors Behaviors Descriptions Potential Criminal or Non-criminal Activities Requiring Additional Information During the Vetting Process or Investigation Note: When the behavior or activity involves behavior that may be lawful or is constitutionally protected activity, the investigating law enforcement agency will carefully assess the information and gather as much information as possible before taking any action, including documenting and validating the information as terrorism-related and sharing it with other law enforcement agencies. Eliciting Information Questioning individuals or otherwise soliciting information at a level beyond mere curiosity about a public or private event or particular facets of a facility’s or building’s purpose, operations, security procedures, etc., in a manner that would arouse suspicion of terrorism or other criminality in a reasonable person. Testing or Probing of Security Deliberate interactions with, or challenges to, installations, personnel, or systems that reveal physical, personnel, or cybersecurity capabilities in a manner that would arouse suspicion of terrorism or other criminality in a reasonable person. Recruiting/Financing Providing direct financial support to operations teams and contacts or building operations teams and contacts; compiling personnel data, banking data, or travel data in a manner that would arouse suspicion of terrorism or other criminality in a reasonable person. Photography Taking pictures or video of persons, facilities, buildings, or infrastructure in an unusual or surreptitious manner that would arouse suspicion of terrorism or other criminality in a reasonable person. Examples include taking pictures or video of infrequently used access points, the superstructure of a bridge, personnel performing security functions patrols, badge/vehicle checking), security-related equipment perimeter fencing, security cameras), etc. Observation/ Surveillance Demonstrating unusual or prolonged interest in facilities, buildings, or infrastructure beyond mere casual tourists) or professional engineers) interest and in a manner that would arouse suspicion of terrorism or other criminality in a reasonable person. Examples include observation through binoculars, taking notes, attempting to mark off or measure distances, etc. Materials Acquisition/ Storage Acquisition and/or storage of unusual quantities of materials such as cell phones, pagers, radio control toy servos or controllers; fuel, chemicals, or toxic materials; and timers or other triggering devices, in a manner that would arouse suspicion of terrorism or other criminality in a reasonable person. Acquisition of Expertise Attempts to obtain or conduct training or otherwise obtain knowledge or skills in security concepts, military weapons or tactics, or other unusual capabilities in a manner that would arouse suspicion of terrorism or other criminality in a reasonable person. Weapons Collection/ Discovery Collection or discovery of unusual amounts or types of weapons, including explosives, chemicals, and other destructive materials, or evidence, detonations or other residue, wounds, or chemical burns, that would arouse suspicion of terrorism or other criminality in a reasonable person. Sector-Specific Incident Actions associated with a characteristic of unique concern to specific sectors the public health sector), with regard to their personnel, facilities, systems, or functions in a manner that would arouse suspicion of terrorism or other criminality in a reasonable person. Defined Criminal Activity and Potential Terrorism Nexus Activity Breach/Attempted Intrusion Unauthorized personnel attempting to enter or actually entering a restricted area, secured protected site, or nonpublic area. Impersonation of authorized personnel police/security officers, janitor, or other personnel). Misrepresentation Presenting false information or misusing insignia, documents, and/or identification to misrepresent one’s affiliation as a means of concealing possible illegal activity. Theft/Loss/Diversion Stealing or diverting something associated with a facility/infrastructure or secured protected site badges, uniforms, identification, emergency vehicles, technology, or documents {classified or unclassified}), which are proprietary to the facility/infrastructure or secured protected site. Sabotage/Tampering/ Vandalism Damaging, manipulating, defacing, or destroying part of a facility/infrastructure or secured protected site. Cyberattack Compromising or attempting to compromise or disrupt an organization’s information technology infrastructure. Expressed or Implied Threat Communicating a spoken or written threat to commit a crime that will result in death or bodily injury to another person or persons or to damage or compromise a facility/infrastructure or secured protected site. Aviation Activity Learning to operate, or operating an aircraft, or interfering with the operation of an aircraft in a manner that poses a threat of harm to people or property and that would arouse suspicion of terrorism or other criminality in a reasonable person. Such activity may or may not be a violation of Federal Aviation Regulations. http://nsi.ncirc.gov rev. 03/15