CAUTION: Always exercise extreme caution as individuals conducting surveillance may not only be involved in gathering information for terrorist acts but may also be involved in criminal activity. Always have available all of the telephones numbers needed to report your findings (local law enforcement, terrorism tip lines).
Some information gatherers are highly trained individuals. One should never presume that it would be easy to identify those who may be conducting surveillance. Two common sense factors, which may help guide the counter-surveillance efforts are:
1. Frequent presence in a given area. 2. No clear or logical reason for them to be in the vicinity.
Common Indicators: Alone, nervous, agitated. Secretive, furtive behavior. Unusual behavior, such as staring at and quickly looking away from personnel observing them. Individuals waiting at a bus stop or train platform, but not boarding. People standing in public or customer service areas, but not requesting service. A person leaving a package or knapsack behind as they exit public transportation or crowded area. Unusual interest in security measures, equipment and/or pedestrian traffic flow. An unidentified individual asking questions that pertain to facility infrastructure and security measures, in person or on the phone Unexpected deliveries or services. Activity not consistent with location or task being conducted. Loose or bulky clothing not suited to current weather conditions. o Unattended packages, briefcases, and other items. Unusual accessories not fitting in with the area or the individual (e.g., baby strollers, shopping carts, backpacks, delivery bicycles with storage compartments, ice cream carts). Equipment not consistent with commonly seen items within the area (e.g., Global Positioning Satellite devices, movie and still cameras, voice recording, sketching tools. Rigid, stiff midsection (indicative of concealed explosives or weapons). Exposed wires or switches. Hands not visible or tightly held. The deliberate, cautious actions of a person handling packages, backpacks or baggage. o Individuals not fitting into the surrounding environment (e.g., individual wearing a winter coat in summer, a backpack, a large duffle bag, suitcase). Individuals observing reaction drills, procedures, response times, and security equipment. Illegally parked vehicles in and around your facility. Individuals working in pairs or groups who appear near same location on multiple occasions. An individual may create a scene to distract security personnel while the accomplice attempts to enter the facility. Individuals conveniently getting lost or disoriented while visiting your facility. Unannounced and/or unauthorized maintenance work. Persons or vehicles seen in the same location on multiple occasions; an individual sitting in a parked vehicle for an extended period of time. Individuals disguised as panhandlers, shoe shiners, newspaper, and food or flower vendors, not acting consistent with their tasks. Individuals who do not work, have business, or belong in their current area, attempting to befriend someone to obtain sensitive information or attempting to blend in. An unknown individual hands you a parcel or letter for deliver to a building or for the mail. o Persons observing (testing) your emergency response to abandon packages, suspicious activity, criminal activity and/or motor vehicle accidents. Persons observing your emergency evacuation drills and or assembly area’s. Individuals who appear to be conducting surveillance (e.g., explicit or discreet use of picture taking, video cameras, cell-phone cameras, binoculars, note taking, and/or sketching) of your facility. First responder vehicles or trucks being stored in unusual locations. First responders who do not appear to fit in or know what to do. If you suspect malicious surveillance, you should carefully and covertly monitor it and report this information immediately to the appropriate law enforcement authorities. Try to remember as much as possible about the individual conducting the surveillance, his or her clothing, personal identifying characteristics, their points of interest, vehicle information, and possible accomplices.
It is recommended that once you have completed your observation, you retreat to a location several blocks away from the targeted location to meet with authorities. Avoid causing undue attention; never arouse interest in yourself from a possible adversary.