National Academies Press: OpenBook

Responding to Threats: A Field Personnel Manual (2004)

Chapter: 6 What to Look For

« Previous: 5 Where to Look
Page 7
Suggested Citation:"6 What to Look For." National Academies of Sciences, Engineering, and Medicine. 2004. Responding to Threats: A Field Personnel Manual. Washington, DC: The National Academies Press. doi: 10.17226/13831.
×
Page 7
Page 8
Suggested Citation:"6 What to Look For." National Academies of Sciences, Engineering, and Medicine. 2004. Responding to Threats: A Field Personnel Manual. Washington, DC: The National Academies Press. doi: 10.17226/13831.
×
Page 8
Page 9
Suggested Citation:"6 What to Look For." National Academies of Sciences, Engineering, and Medicine. 2004. Responding to Threats: A Field Personnel Manual. Washington, DC: The National Academies Press. doi: 10.17226/13831.
×
Page 9

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

76 What to Look For Users of this manual are not being asked to be James Bond or clairvoyant. You are not to make any assessment about an individual’s intentions. You are not security or intelligence personnel. You are to observe and report unusual behavior, unusual objects, and unusual circumstances at or near a potential target so security personnel can direct further attention to the situation. REMEMBER Do not ever allow yourself to use racial or any other type of profiling. There is no racial, ethnic, or religious key to potentially hostile activity. If you allow yourself to believe otherwise, you will be totally ineffective. Unusual Behavior You are looking for unusual behaviors that you cannot readily explain at or near a potential target. The potential terrorist/criminal in a Red Zone knows he or she is doing something wrong. He/she will manifest some of the following behaviors: Personal Signs/Traits • Nervousness (excessive smoking, pacing, sweating, etc.) • Avoidance of eye contact • Fixation on the target • Facial concealment with dark glasses, hats, scarves, etc. • Clothing that doesn’t fit the area/weather • Couples who do not demonstrate any sort of interpersonal relationship • Shielding activities and masking behavior from onlookers, passing police, secu- rity personnel, and video cameras • Wearing the uniform of delivery, postal, or repair people, but not functioning as such Unusual Activities—Active • Ignorance of local customs, laws, or idioms • Use of binoculars, cameras, night vision devices, GPS • Making notes or sketches of a potential target • Pacing off or measuring distances • Looking for a parking space, but never parking when they could

• Fishermen lacking the proper gear or knowledge—they may return to the same spot even though they catch nothing Unusual Activities—Passive • People who apparently have “nothing to do” • People who remain in place in spite of inclement weather • Repeated presence in the same location • Repeated presence at multiple potential targets • Loitering in areas that locals consider unsafe • Sitting in vehicles that are apparently broken, but no effort is made to repair them • Sitting in a parked vehicle for no apparent reason Unusual Objects You are looking for unusual objects that you cannot readily explain at or near a potential target. The distinction between suspicious objects, which may contain a bomb, and lost-and-found objects, is something that you will learn with practice. Some gen- eral guidelines on these are listed below. 8 Suspicious Objects Likely Lost & Found Objects A closed bottle or pipe with A wallet or small purse attached wires or battery Briefcase, package, or bag in Briefcase or bag left in or next to a an unusual place (e.g., behind seat in a waiting area, a phone a vending machine, trash booth, or vending machine containers, or restroom fixtures) Common objects that may Common objects left in spots generally have value to people where people may frequently but are left unattended in an place things temporarily uncommon place for forgetting things Unusual Circumstances You are looking for unusual circumstances that you cannot readily explain at or near a potential target. Examples of these may include the following: People • A person placing a common object (e.g., briefcase) in a common place, and then rapidly leaving the area • A highly agitated person entering a room, looking around, and leaving in a highly agitated state • Two or more people suddenly experiencing unidentified odor, coughing or breath- ing difficulty, nausea, or blurred vision

9Vehicles • Unusual use of vehicle (e.g., van containing drums of diesel fuel, overloaded vehi- cle with missing license plates, freshly painted vehicle in a dirty setting) • Vehicles parked in sensitive places (e.g., bridge column, under overpasses, next to fuel depots, hazmat facilities, etc.) • Vehicles parked in functionally uncharacteristic places (e.g., rental truck in front of a hospital, gasoline truck at a school, etc.) • Vehicle(s) left in target area with driver departing in another (get-away) vehicle More Common Crimes From the introduction, you will remember that road rage, domestic violence, and workplace violence are far more likely than a terrorist attack. As you become more attentive to your surroundings, you will be more likely to notice signs of these more common crimes, which are included in some definitions of terrorism. Indeed, the vio- lent expressions involved in these more common crimes have terrorist elements. Signs of some of these more common crimes are listed below: Road Rage • Speeding • Severe braking • Unsafe lane changes, weaving, swerving • Violent or obscene gestures • Tailgating • Angry, hard facial expressions Workplace Violence • Sudden outbursts of anger • Dissatisfaction with job or a supervisor • Increasing level of anger • Decline in work quality • Domestic violence (this can visit the workplace) REMEMBER For all crimes, you are looking for anything unusual that correlates to a potential target and cannot be readily explained. It is better to report something that can later be acceptably explained than to not report something that could have led to the prevention of a crime or attack.

Next: 7 How and What to Report »
Responding to Threats: A Field Personnel Manual Get This Book
×
 Responding to Threats: A Field Personnel Manual
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

TRB’s National Cooperative Highway Research Program (NCHRP) Report 525: Surface Transportation Security, Volume 1: Responding to Threats: A Field Personnel Manual includes a draft template that contains basic security awareness training in a workbook format that can be redesigned as a pamphlet, glove-box brochure, or other user-specific document. This NCHRP manual emphasizes noticing and reporting behavior that may be part of the planning stages of an event, and explains how an increased level of attention on the part of all employees can deter criminal and terrorist plans prior to implementation.

NCHRP Report 525: Surface Transportation Security is a series in which relevant information is assembled into single, concise volumes—each pertaining to a specific security problem and closely related issues. The volumes focus on the concerns that transportation agencies are addressing when developing programs in response to the terrorist attacks of September 11, 2001, and the anthrax attacks that followed. Future volumes of the report will be issued as they are completed.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!