<\/figure><\/div>\n\n\n\nThe Department of Homeland Security prepared and distributed an information guide titled The Seven Signs of Terrorism; the guide is an accurate representation of the strategies employed by terrorists. These Seven Signs offer an opportunity to look for unusual circumstances and report them to law enforcement. The benefit to all Americans is that at any one of these steps, a potential attack can be prevented.<\/p>\n\n\n\n
Sign 1 – Surveillance<\/strong><\/p>\n\n\n\nPrior to an attack, often weeks or months before, terrorists will \nconduct surveillance and scouting operations. Such methods include \nphotography, videotapes, diagramming, mapping, measuring, and \nobserving security, or other out of the ordinary practices. These acts \nhave occurred on our ferry systems in New York and Washington State, \nthe JFK airport, power grids, dams, buildings (Sears Tower in \nChicago), bridges (Brooklyn and George Washington in New York), \ntunnels (Lincoln and Holland in New York), subway systems, rail, and \nmany others.<\/p>\n\n\n\n
What to look for:<\/p>\n\n\n\n
Suspicious people taking video or photos, diagramming or measuring \nin areas not normal; they may be there on multiple occurrences, or may \nbe different people collecting the same information; staying in \nposition for longer than normal times.<\/li> The use of technology such as cell phone cameras, mini-cameras.<\/li> Taking photos or video of security; timing security, measuring \ndistances from police or fire stations to the target.<\/li> The use of GPS units where it seems unusual.<\/li> People in possession of maps of critical infrastructure, highlighted \nin key areas.<\/li> The use of communications equipment where not normally used – cell \nphones, walkie-talkies.<\/li><\/ul>\n\n\n\nFor example, in Washington State, there has been considerable \nsurveillance done on the ferry system. Hundreds of reports have been \nmade of suspicious activities, including photography, videotaping, \nmeasuring, diagramming, cell phone conversations with nearby boats, \nattempts to enter secure areas, including the pilot house and engine \nrooms. The photography has not been of the truly outstanding scenery \nof Seattle, but has been structural supports of the ferries, security \noperations, traffic and passenger movement, and ferry operations. Many \nof these cases have been reported to law enforcement and \ninvestigations determined that more than two dozen were classified as \npre-operational surveillance.<\/p>\n\n\n\n
Other examples have included surveillance of similar activities in \nshopping malls, mass transportation, power stations, cell towers, \ndams, and other critical facilities. There are many well documented \ncases of such behavior in the United States. As will be discussed in a \nlater chapter, there have been a number of attacks disrupted in \nAmerica due to citizens and law enforcement personnel who are alert \nand aware.<\/p>\n\n\n\n
Sign 2 – Elicitation<\/strong><\/p>\n\n\n\nTerrorists will attempt to gather and obtain information about a \nplace, person, or operation that is more likely than not a critical \ninfrastructure, either public or private. They may ask questions, make \ninquiries, they may obtain plans or blueprints, or other information, \nmuch of it from the Internet.<\/p>\n\n\n\n
What to look for:<\/p>\n\n\n\n
People asking questions, unusual or normal, looking to get information. Pay particular attention to questions about security, access to facilities or information systems, delivery schedules.<\/li> Attempts to access information via computer – blueprints, plans, schedules, anything to do with strengths or weaknesses. Information in the media has been of interest.<\/li><\/ul>\n\n\n\nAn example of elicitation may involve a person unknown to you, asking \nwhat may appear to be normal questions, always looking for \ninformation. Such a case may involve a critical facility, such as a \npower station, or computer data center. The person may appear as if a \ntourist or just a person interested in electronics or computers. \nQuestions may include hours of operation, how many people work in the \nbuilding, whether it has security, or alarm systems to protect the \nfacility or business information. These questions may be fitted in \namong other ordinary conversation. Always be aware that if it doesn’t \nseem normal, it probably isn’t.<\/p>\n\n\n\n
Sign 3 – Tests of Security<\/strong><\/p>\n\n\n\nTerrorists will test security\/law enforcement by entering or \nattempting to enter secured or essential faciities or locations, and\/ \nor will time reponses and routes of response. The locations of police, \nfire, emergency medical services will be identified and routes of \nresponse located; timing of resonse likely will happen as well, \nusually through a false alarm.<\/p>\n\n\n\n
What to look for:<\/p>\n\n\n\n
People attempting to enter secured or forbidden areas. If contacted \nby security while doing so, they will usually have a plausible story.<\/li> Attempts to move prohibited materials through security to determine \nif they will be detected and what the response will be.<\/li> False alarm or false report of an incident to test response times, \ndeployment, and numbers of responders.<\/li> Testing of alarm systems to determine reaction and timing.<\/li> Unattended packages or briefcases to see what the reaction will be.<\/li><\/ul>\n\n\n\nThere are any number of examples supporting this as a planning step. \nOn the Washington State ferries, for example, there were many attemps \nto enter teh locked engineering facilities or locked pilot house. \nThese attempts have been both overt and covert. Each time, when caught \ndoing so, there is always a prepared story for the particular \ncircumstances.<\/p>\n\n\n\n
Another case occurred at a major shopping mall where the suspicious \nbehavior involved the attempt to enter secure areas. The intent is to \ntry to determine what the response by security, law enforcement, or \nstore personnel would be, always looking for the amount of time it \ntakes to react, as well as what the actual reaction will be. Again, \nwhen contacted, there is always a prepared story to be told.<\/p>\n\n\n\n
Sign 4 – Acquiring Supplies<\/strong><\/p>\n\n\n\nTerrorists will purchase weapons and ammunition, explosives or the \ncomponents of explosives, chemicals, equipment, or military or law \nenforcement identification and uniforms to allow easier access into \nareas.<\/p>\n\n\n\n
What to look for:<\/p>\n\n\n\n
People who buy excessive amounts of dangerous chemicals or \ncomponents that can be used in constructing explosive devices – an \nexample would be fertilizer (ammonium nitrate).<\/li> People buying weapons and ammunition at unusual levels.<\/li> People who are not law enforcement or security buying (or stealing) \nuniforms, badges, identification cards.<\/li> People buying used emergency vehicles that may be used in an effort \nto access the target without raising suspicion.<\/li> People attempting to obtain access cards to facilities.<\/li> Thefts of weapons, with an emphasis on military grade weapons.<\/li><\/ul>\n\n\n\nIn recent years, there have been a number of thefts of law enforcement \nvehicles, ambulances, and government vehicles. There are also a number \nof cases of stolen or missing law enforcement, fire, and emergency \nmedical personnel uniforms, badges and identification cards. Many have \nnot been recovered, and it is not known if terrorists stole them. \nPresuming they did in some cases, and emergency vehicle or uniform, \nincluding identification can offer any number of opportunities to \nenter into areas not normally accessible.<\/p>\n\n\n\n
Weapons are easy to obtain, as is ammunition. Explosives and explosive \ncomponents are no longer that easy to purchase in quantity due to the \nhighly successful efforts of law enforcement. Due to the awareness of \nthe American people it has become much more difficult to amass large \nquantities of potentially dangerous materials for use in an attack. Of \nnote is that we must remain diligent in being aware, prepared, and \nneed to report.<\/p>\n\n\n\n
Sign 5 – Suspicious People<\/strong><\/p>\n\n\n\nLook for people who are out of the ordinary, who do not belong, or \nwhose actions are out of the ordinary. Appearance, position, and the \nactions may each be indicators. This may be as simple as knowing it \nwhen you see it – to follow your instincts. Profile behaviors, not \npeople. Terrorists take advantage of political correctness and the far \nof potentially offending someone.<\/p>\n\n\n\n
Terrorists are not all of one race, color, or gender. They use men, \nwomen, and children of many races and ages. There are numerous cases \nof these actions, including parents placing explosives on their \nchildren and exploding them in crowds. There are cases of terrorists \nplacing explosives on the elderly and mentally handicapped people, \nthen directing them to the target and exploding them. Watch for \nsuspicious behaviors, not suspicious people. If it looks wrong, it may \nvery well be wrong – report it.<\/p>\n\n\n\n
What to look for:<\/p>\n\n\n\n
People whose actions are not ordinary or normal.<\/li> People who seem out of place.<\/li> People not dressed for the weather or location.<\/li> People trying to avoid detection or letting others see who they are.<\/li> People who are evasive when spoken to or confronted.<\/li> Carrying materials not suitable to the location.<\/li> People attempting to hide.<\/li> Reports of weapons practice in out of the way areas.<\/li><\/ul>\n\n\n\nBecause the American people are substantially more aware of events, \ncircumstances, and their surroundings, detecting these activities is \nmuch more frequent. Passengers on Washington State ferries report many \nsuspicious behaviors. The recent case in New Jersey involving the \nterrorists plotting to attack Fort Dix was stopped due to an alert \nstore clerk reporting behaviors on a video.<\/p>\n\n\n\n
A case in Washington State involved neighbors observing long-time \nneighbors with their garage full of cases of cigarettes. Although they \ndid not know of the significance, this inquiry led the FBI to money \nlaundering for terrorists through cigarette purchases, which is not an \nuncommon tactic to raise money. Other than the cigarettes these next \ndoor neighbors were friendly and sociable people.<\/p>\n\n\n\n
Sign 6 – Dry Runs<\/strong><\/p>\n\n\n\nPrior to the actual attack the terrorists will conduct one or more dry \nruns to look for flaws or unanticipated problems. This is a critical \ntime when they may be identified or caught. There are many examples of \nthis occurring. Prior to 9\/11 the hijackers flew on the same planes \nthey ultimately hijacke on multiple occasions scouting the best seats, \ntiming opening and closing cockpit doors, timing specific actions of \nflight attendants, which planes had the most fuel and fewest \npassengers, always looking to maximize casualties and damage.<\/p>\n\n\n\n
The terrorists plotting to hijack 10 airliners out of the UK were \nidentified and apprehended during a dry run. Virtually all major \nattacks, before they occur, will have had a least one or more dry \nruns. Terrorists will conduct a test of their plan to look for \nproblems they may overcome before the actual operation.<\/p>\n\n\n\n
What to look for:<\/p>\n\n\n\n
Tests of the system: security, response times, reactions to the \ntest.<\/li> Suspicious people or suspicious actions – if they seem out of the \nordinary they probably are.<\/li><\/ul>\n\n\n\nTerrorist interest in airlines has not diminished, and they are \ncontinually seeking new ways to use aircraft as controlled missiles to \nspecific targets. More recent dry runs have included using larger \nnumbers of hijackers, different types of explosives,, and theft of \nairline uniforms and identification. Actual attempts have been stopped \nin other countries, including a recent attempt in China.<\/p>\n\n\n\n
The Fort Dix plotters made a number of runs into the fort delivering \npizza in order to determine the best time, best route, and best escape \nroute from the fort. From an elicitation perspective, as a result of \nprior business in the fort, they were able to obtain a map, ostensibly \nto know where to deliver pizza – an excellent example of elicitation.<\/p>\n\n\n\n
Sign 7 – Deployment of Assets<\/strong><\/p>\n\n\n\nThis is immediately prior to the attack and is the last opportunity to \nstop the attack. The terrorists will move into their pre-determined \npositions just prior to the attack. Once in place and the timing is \nappropriate, they will attack the target. The history of attacks \ndemonstrates that the terrorists may not always assemble in one \nlocation. These are the activities where the terrorists stage for the \nattack.<\/p>\n\n\n\n
What to look for:<\/p>\n\n\n\n
People or vehicles in unusual positions or places.<\/li> People dressed in clothing not aligned with weather or location.<\/li> Unusual number of people or vehicles (or vehicle types) in vicinity \nof possible attack site.<\/li><\/ul>\n\n\n\nWhile these indicators and signs are not a complete list, they give \nthe reader an idea of what to look for and report, or respond to.<\/p>\n\n\n\n
(Source: Suicide Terror: Confronting the Threat<\/em> by William E. Cooper)<\/p>\n","protected":false},"excerpt":{"rendered":"The Department of Homeland Security prepared and distributed an information guide titled The Seven Signs of Terrorism; the guide is an accurate representation of the strategies employed by terrorists. These Seven Signs offer an opportunity to look for unusual circumstances and report them to law enforcement. The benefit to all Americans is that at any […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"\n
Seven Signs Of Terrorism ·<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n \n\t \n