According to the Department of Homeland Security website, the following indicators suggest possible terrorist planning.1. Prolonged interest in security measures, personnel, entry points and access controls, or perimeter barriers such as fences or walls.2. Behavior such as staring or quickly looking away from personnel or vehicles entering or leaving designated facilities or parking areas.3. Observation of security reaction drills or procedures. 4. Increase in anonymous telephone or e-mail threats to facilities in conjunction with suspected surveillance incidentsindicating possible surveillance of threat reaction procedures.5. Surveillance by two or three individuals on foot. 6. Mobile surveillance using bicycles, scooters, motorcycles, cars, trucks, SUVs, limousines, boats or small aircraft.7. Prolonged static surveillance using operatives disguised as panhandlers, shoe shiners, food or flower vendors, news agents or street sweepers not previously seen in the area.8. Discreet use of still cameras, video recorders or note-taking at nontourist locations.9. Use of multiple sets of clothing and ID.10. The use of sketching materials (such as paper and pencils). Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe