Virginia State Police have issued a statement regarding the death of terrorist mastermind Osama bin Laden at the hands of U.S. forces.
VSP is urging Virginia residents to “remain vigilant in their awareness to suspicious activity within their communities and workplaces.” Specifically, the agency is asking Virginians to be on the lookout for terrorist fundraising, surveillance and “dry runs.”
RICHMOND – As the nation heralds the capture and death of the founder and leader of al Qaeda, Osama bin Laden, Virginians are reminded to remain vigilant in their awareness to suspicious activity within their communities and workplaces. Over the past nine months, Virginia state and local law enforcement have been working with the Department of Homeland Security (DHS) to spread awareness of the “If You See Something, Say Something” campaign and the Nationwide Suspicious Activity Reporting (SAR) Initiative (http://www.dhs.gov/files/reportincidents/see-something-say-something.shtm). The national campaign is designed to help America’s businesses, communities and citizens remain vigilant and play an active role in keeping our country and commonwealth safe.
“At this time, there is no known direct threat against Virginia or its infrastructure as a result of these recent events,” said Colonel W. Steven Flaherty, Virginia State Police Superintendent. “We simply want to remind our citizens to stay attune to their surroundings and environment, and to always report suspicious activity to law enforcement.”
Virginians have numerous ways of reporting suspicious activity to law enforcement:
- Call 911 to reach your local police or sheriff’s office
- Dial #77 on your cell to reach your nearest Virginia State Police Office
- Call 1-877-4VA-TIPS to reach Virginia’s Terrorist Tip Hotline
- Email Virginia State Police/Virginia Fusion Center at [email protected]
See the rest of the press release after the jump.
The DHS “If You See Something, Say Something” campaign provides eight signs of terrorism to help citizens determine what exactly equates as suspicious activity. These can also be applied to detecting and preventing practically any type of crime within one’s community:
Terrorists will likely observe a chosen target during the planning phase of an operation. They do this to determine the strengths, weaknesses and number of emergency personnel that may respond to an incident. Suspicious actions during this phase may include someone recording or monitoring activities, drawing diagrams or making notes on maps, using vision-enhancing devices, or having possession of floor plans or blue prints of places such as high-tech firms, financial institutions, or government facilities, including military installations. Routes to and from the target are also usually established during the surveillance phase.
A second sign, inquiries, entails attempting to gain information about a place, person, or operation pertaining to the target. Terrorists may attempt to elicit information about a critical infrastructure such as a power plant, water reservoir, maritime port, military base, bridge or tunnel by making unusual inquiries. They may inquire about usage and operations. Additionally, they may attempt to place people in legitimate employment at key locations to monitor day-to-day activities and gather detailed knowledge in order to make their mission or scheme more effective.
3. Tests of Security
Terrorists may also test a target’s security to gather data. To do this, they may drive by the target, moving into sensitive areas and observing security or law enforcement response. They are likely assessing how long before personnel respond to a security breech or the routes responders take to a specific location. Terrorists may also attempt to penetrate physical security barriers or procedures in order to assess strengths and weaknesses.
Although this is a tough sign to pick up on, it is one of the most important. Without funding, terrorist activity will come to a dramatic halt. Terrorists are very creative in raising, transferring, and spending money they come in contact with. Some scenarios to look for include: (1) credit card fraud, (2) defrauding the elderly, (3) people asking for donations to legitimate organizations but in peculiar ways, and (4) very large amounts of cash used in business transactions.
5. Acquiring Supplies
Terrorists may purchase or steal explosives, weapons, ammunition, or attempt to store harmful chemical equipment. In order to gain easier entrance to a secured area, they may also try to acquire uniforms, equipment or identification of first responders, including military personnel. Other items they may try to obtain include flight passes, flight manuals, passports or other pieces of identification. If they are unable to steal these types of things, they may attempt to create counterfeit copies.
6. Suspicious/Out-Of-Place Behavior
Profiling individuals is wrong, however, profiling behaviors may indicate suspicious behavior. Sometimes suspicious people just “don’t belong” or a behavior seems out of place. This may include a person in a workplace, building, neighborhood or business establishment that does not fit in because of demeanor, language usage or unusual questions they ask.
7. Dry Runs
Before executing the final operation or plan, terrorists may engage in a practice session, or “dry run,” to work out flaws or unanticipated problems. Although they normal conduct multiple practice sessions at or near the target area, a “dry run” may be the heart of the planning stage of a terrorist act. During a “dry run,” terrorists may monitor police radio frequencies and record emergency response times.
8. Deploying Assets/Getting Into Position
The deployment assets or getting into position stage is an individual’s last chance to alert authorities before the terrorist act occurs