Suspicious Activity Reporting
“iWATCH, iREPORT, i Keep Us Safe”
What is iWATCH Week of 03 Jan 12.jpg
Story by: Staff Writer Dena O'Dell
1st Infantry Division, PAO
Fort Riley's Antiterrorism Office is gearing up for its second quarter theme, "Suspicious Activity Reporting," which reminds Soldiers, Families and Department of the Army civilians to report suspicious activity to thwart potential terrorist attacks.
"The main purpose is to focus all the efforts with our civilian workforce, Family members and our military members into a heightened awareness and vigilance to prevent and protect the Fort Riley community and all our critical resources from any acts of terrorism – whether it be international or more of a domestic home-grown extremist," said Chris Hallenbeck, Fort Riley AT specialist.
Suspicious activity on post can include, but is not limited to: People drawing or measuring buildings; strangers asking questions about security or building security procedures; briefcases, backpacks, suitcases or packages left behind; cars or trucks left in "No Parking" zones; intruders in secured areas where they are not supposed to be; a person wearing clothes that are too big and too hot for the weather; people asking questions about sensitive information; or someone purchasing supplies or equipment that can be used to make bombs or weapons, as well as someone purchasing uniforms without having the proper credentials, according to Hallenbeck.
The eight signs of terrorism include:
•Surveillance – Someone recording or monitoring activities, which may include the use of cameras, note taking, drawing diagrams, annotating on maps or using binoculars or other vision-enhancing devices;
•Elicitation – People or organizations attempting to gain information about military operations, capabilities or people, which can be made through mail, email, telephone or in person;
•Tests of security – Any attempts to measure reaction times to security breaches, attempts to penetrate physical security barriers or monitor procedures in order to assess strengths and weaknesses;
•Funding – Suspicious transactions involving large cash payments, deposits or withdraws, which are common signs of terrorist funding. Collections for donations, solicitation for money and criminal activity also are warning signs;
•Supplies – Purchasing or stealing explosives, weapons or ammunition, which also can include acquiring military uniforms, decals, flight manuals, passes , badges or the equipment to manufacture such items and any controlled items;
•Impersonation – People who don't seem to belong in the workplace, neighborhood, business establishment or anywhere else. This also can include suspicious border crossing, impersonation of law enforcement officers, military personnel or company employees;
•Rehearsal – Putting people in a position and moving them around according to their plan without actually committing the terrorist act. An element of this activity also could include mapping out routes and determining the timing of traffic lights and flows; and
•Deployment – People and supplies getting into position to commit the act. At this step, this is the last chance for anyone who sees this type of activity to alert authorities before the terrorist act occurs.
Along with pre-existing ways to report suspicious activity – by calling the AT office at 785-239-6303/6044 or 1-800-CALL-SPY; Fort Riley Police Department at 785-239-MPMP (6767); or by email at firstname.lastname@example.org – anyone who sees something out of the ordinary on post also can now use a mobile device to scan a QR code located on any iWATCH flyer to instantly access the suspicious activity report on the iWATCH page.
Those reporting suspicious activity should report when the activity occurred; what the type of activity was; where it occurred; what was seen; how many people were involved; how many vehicles were involved; and, if pictures were taken of the suspicious activity, they should be provided to the reporting agency as well.