What to Report

NCISAACSeal.jpgIf you see suspicious activity, remember that your safety comes first. Do not ever attempt to contact, pursue or in any way interfere with anyone or any group that you think are acting suspiciously.  Call 911 immediately for a situation needing an immediate response from law enforcement.

The following are items that will be useful to ISAAC investigators if you see the following suspicious activity by individuals or groups:

  1. Monitoring activites using cameras, recording, note-taking, maps or diagrams. 
  2. Testing security by measuring reaction times, penetrating security barriers or watching procedures to assess security.
  3. Acquiring supplies by either purchasing or stealing explosives, weapons, ammo, etc.
  4. Purchase or theft of uniforms, decals, flight manuals, passes or badges.
  5. Attempts to gain information about operations, infrastructure, or people by mail, email, phone or in person.
  6. Rehearsing a plan by putting people in position and moving them around without actually committing the terrorist act.
  7. Putting people and supplies into position to commit a terrorist act. (The last chance to alert authorities before the act occurs).
  8. Noticing people who don't seem to belong in the workplace, neighborhood or in a particular building or area.
  9. Suspicious transactions involving large cash payments, deposits or withdrawals - possible signs of terrorist funding.
  10. Unauthorized person or persons attempting to enter or actually entering a restricted area or protected site.
  11. Impersonation of authorized personnel (e.g. police, security, janitor).
  12. Presenting false documents or misusing insignia to cover possible illicit activity.
  13. Stealing or diverting things associated with a facility or infrastructure such as badges, uniforms, identification, emergency vehicles, technology or documents.
  14. Someone damaging, manipulating or defacing part of a building, infrastructure or protected site.
  15. Attempts to disrupt an organization's information technology infrastructure.
  16. Communicating a spoken or written threat of damage to a facility or infrastructure.
  17. Operating an aircraft that would be interpreted as suspicious or posing a threat to people or property. 

Reporting A Suspect's Description:

  • Hair color
  • Hair length
  • Absence or presence of facial hair, and if present, facial hair color
  • Eye color
  • Approximate age
  • Approximate height
  • Approximate weight
  • Distinguishing characteristics, such as visible scars, tattoos, piercings or deformities
  • Clothing, including pants/shorts/skirt/dress, shirt sleeve length, presence of coat/jacket, wearing/not wearing hat or glasses, color of all articles of clothing

Reporting Suspicious Vehicles:

  • License plate number and state
  • Vehicle make/model
  • Approximate year of vehicle
  • Vehicle color
  • Number of doors on vehicle
  • Any visible bumper stickers or window stickers, including their size, color, placement and content
  • Any visible damage to vehicle, such as paint damage, body damage, broken/missing glass, damaged or non-working head or tail light
  • Occupied vehicle sitting idle or parked
  • Individuals taking photos of a potential target facility (landmarks, public buildings, power plants, water treatment facilities, etc.) from inside a vehicle
  • Individuals taking "panoramic" or multiple-shot/multi-angle photos of a potential target facility
  • Individuals taking detailed or extensive notes outside a potential target facility
  • Individuals videotaping a potential target facility from inside a vehicle
  • Individuals shooting long, continuous video of a potential target facility, or videotaping a potential target facility from multiple angles

While the more you observe, the more helpful the information will be.  However, even if you don't get all the details, don't hesitate to call.

Submit an online tip here

Protect Us All Make the Call:  (888) NC ISAAC - (888) 624-7222.