You are here

DHS-FBI Suspicious Activity Reporting Bulletin: Attempted Breaches/Intrusions 2012.08.03

Primary tabs

SizeSeedsPeersCompleted
438.38 KiB000
This torrent has no flags.


DHS-FBI Suspicious Activity Reporting Bulletin: Attempted Breaches/Intrusions

1 page PDF 438kb
For Official Use Only
August 3, 2012

(U//FOUO) The following SAR incidents from the NSI shared space demonstrate the types of intrusive behaviors terrorists might exhibit during preoperational stages or actual attacks. While none were ultimately linked to terrorist activity, they are cited as relevant examples for awareness and training purposes:

— (U//FOUO) An intruder entered a fire station through a door secured with coded entry; it is unknown how the intruder gained access. Video surveillance captured images of the intruder talking on a cellular phone while receiving what appeared to be instructions. The intruder stole a fire “turnout” coat and pants, boots, helmet, and eye protection.

— (U//FOUO) A man dressed in black and wearing a headlamp was seen trying to use a tool to open a manhole cover late at night. The manhole covers in the area are typically used only by water, telephone, or sewer utilities personnel.

— (U//FOUO) The compound fence surrounding a dam powerhouse was cut twice during evening or overnight hours in a 30-day time period. The fence was cut from the bottom up and spread apart to allow a person to crawl through.

(U) Possible Indicators of Breach/Attempted Intrusion

(U//FOUO) The following can indicate suspicious breach/attempted intrusion activity, but context should be carefully considered in order to rule out legitimate, non suspicious activities. Depending on the context—time, location, personal behaviors, and other indicators—suspicious activities should be reported to appropriate authorities.

— (U//FOUO) Presence of unauthorized individuals or vehicles in a restricted area or location.
— (U//FOUO) Evidence of breached security perimeters, such as cut/damaged/removed locks or fencing.
— (U//FOUO) Indications that unauthorized individuals attempt to follow, or piggyback employees or vehicles secured control access points.
— (U//FOUO) Unauthorized individuals apparently trying to access secure or restricted areas and exhibiting suspicious behavior, such as entering during an unusual time of day, 0r obviously trying to avoid detection.
— (U//FOUO) Personnel who deviate from protocols or lack tho correct uniform or identification.

Original here:
publicintelligence.net/dhs-fbi-attempted-breaches/

-Soap