Report Suspicious Activity
If you become aware of suspicious activity DO NOT:
- Ignore you instincts
- Take direct action
- Confront the individual
If you become aware of suspicious activity DO:
- Call 911 if there is a life threatening situation.
- When reporting suspicious activity, it is helpful to give the most accurate description possible, including:
- Notify the University of Tennessee Police Department at 974-3114 as soon as possible and describe observed events:
- Brief description of the activity
- Date, time and location of the activity
- Physical identifiers of anyone you observed
- Descriptions of vehicles
- Information about where people involved in suspicious activities may have gone
- Your name and contact information (optional)
Other reporting options:
- Anonymous text to Tip411 (847411):UTPD <space> your message.
- Online suspicious activity report: http://tiny.utk.edu/dRvZ2
8 Signs of Terrorism
Terrorist operations usually begin with extensive planning. You can help prevent and detect terrorism — and other types of crime — by watching out for suspicious activities and reporting them to the proper authorities. Be alert for the eight signs of terrorism!
Someone recording or monitoring activities. This may include the use of cameras, note taking, drawing diagrams, annotating on maps, or using binoculars or other vision-enhancing devices.
People or organizations attempting to gain information about military operations, capabilities, or people. Elicitation attempts may be made by mail, email, telephone, or in person. This could also include eavesdropping or friendly conversation.
3. Tests of Security
Any attempts to measure reaction times to security breaches, attempts to penetrate physical security barriers, or monitor procedures in order to assess strengths and weaknesses.
Suspicious transactions involving large cash payments, deposits, or withdrawals are common signs of terrorist funding. Collections for donations, the solicitation for money and criminal activity are also warning signs.
Purchasing or stealing explosives, weapons, ammunition, etc. This also includes acquiring military uniforms, decals, flight manuals, passes or badges (or the equipment to manufacture such items) and any other controlled items.
People who don’t seem to belong in the workplace, neighborhood, business establishment, or anywhere else. This includes suspicious border crossings, the impersonation of law enforcement, military personnel, or company employees is also a sign.
Putting people in position and moving them around according to their plan without actually committing the terrorist act. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow.
People and supplies getting into position to commit the act. This is the person’s last chance to alert authorities before the terrorist act occurs.