SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Politics for Pros- moderated

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: KLP who wrote (127130)7/24/2005 8:03:25 AM
From: unclewest  Read Replies (1) of 793864
 
is there a faster way to teach people things to watch for in someone that might be carrying a bomb...or other hazardous materials that would take human life...

Here are some tips put out by USAF.

>>>Suspicious activities, indicators to look for and report


Specific threats: Any threat received that contains a specific time, location or area for an attack.
Surveillance: Any out-of-the-ordinary person recording or monitoring activities. This may include using cameras, taking notes, drawing diagrams, annotating on maps or using binoculars.
Elicitation: People or organizations that don't have a need to know or don't have a proper security clearance attempting to gain security-related or even basic information about military operations, capabilities or people. Elicitation attempts may be made by mail, fax and telephone or in person.
Tests of security: Any attempts to measure security reaction times, security breaches or penetrate physical security barriers or procedures in order to assess strengths and weaknesses.
Acquiring supplies: Purchasing or stealing explosives, weapons, ammunition, etc. Also includes attempts to acquire or duplicate military uniforms, badges, passes or other security-related documents or controlled items.
Suspicious, out-of-place people: These people don't seem to belong in the workplace, neighborhood, business establishment or anywhere else. This includes suspicious crossings of the base perimeter.
Dry run: Putting people into position and moving them around according to their plan without actually committing the terrorist act. This is especially true when planning a kidnapping, but it can also pertain to bombings. An element of this activity could also include mapping routes and determining the timing of traffic lights and flow.
Deploying assets: People and supplies getting into position to commit the act. This is a person's last chance to alert authorities before the terrorist act occurs.
Repetitive activities: Any two or more suspicious activities by the same person or vehicle in a one-month period.
Suspicious activities or incidents: Any activity that does not specifically fit into the previous categories yet is suspicious, such as thefts of personal items from your vehicle, home or office. <<<

The authorities prefer you report anything that arouses your suspicions...and do not wait to report them. Your little observation may be the missing key they need.

George Washington said long ago, "Even minutiae should have a place in our collection, for things of a seemingly trifling nature, when enjoined with others of a more serious cast, may lead to valuable conclusion."

Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext