- Ignore your instincts.
- Take direct action or pursue.
- Confront the individual.
YOUR SAFETY COMES FIRST!
If you become aware of suspicious activity, DO:
- Call 911 if there is a life threatening situation.
- When reporting suspicious activity, it helps to give the most accurate description possible.
- Notify the UT Police Department at 974-3114 as soon as possible and describe the events you observed:
- Brief description of the activity
- Date, time, and location of the activity
- Physical identifiers of anyone you observed
- Descriptions of vehicles
- Information about where people involved in suspicious activities may have gone
- Your name and contact information (optional)
Other reporting options:
8 Signs of Terrorism
Terrorist operations usually begin with extensive planning. You can help prevent and detect terrorism — and other types of crime — by watching out for suspicious activities and reporting them to the proper authorities. Be alert for the eight signs of terrorism!
1. Surveillance: Someone recording or monitoring activities. This may include the use of cameras, note taking, drawing diagrams, annotating on maps, or using binoculars or other vision-enhancing devices.
2. Elicitation: People or organizations attempting to gain information about military operations, capabilities, or people. Elicitation attempts may be made by mail, e-mail, phone, or in person. This could also include eavesdropping or friendly conversation.
3. Tests of Security: Any attempts to measure reaction times to security breaches, attempts to penetrate physical security barriers, or monitor procedures in order to assess strengths and weaknesses.
4. Funding: Suspicious transactions involving large cash payments, deposits, or withdrawals are common signs of terrorist funding. Collections for donations, the solicitation of money, and criminal activity are also warning signs.
5. Supplies: Purchasing or stealing explosives, weapons, ammunition, etc. This also includes acquiring military uniforms, decals, flight manuals, passes or badges (or the equipment to manufacture such items), and any other controlled items.
6. Impersonation: People who don’t seem to belong in the workplace, neighborhood, business establishment, or anywhere else. This includes suspicious border crossings, the impersonation of law enforcement, military personnel, or company employees.
7. Rehearsal: Putting people in position and moving them around according to their plan without actually committing the terrorist act. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow.
8. Deployment: People and supplies getting positioned to commit the act. This is the last chance to alert authorities before the terrorist act occurs.
A potential active shooter may exhibit additional warning signs that appear suspicious. You can learn more from Vols Help Vols.