{"id":239,"date":"2012-05-02T10:16:11","date_gmt":"2012-05-02T15:16:11","guid":{"rendered":"http:\/\/blogs.shu.edu\/codeblue\/?p=239"},"modified":"2017-06-06T16:15:37","modified_gmt":"2017-06-06T20:15:37","slug":"terrorism-indicators","status":"publish","type":"post","link":"https:\/\/blogs.shu.edu\/codeblue\/2012\/05\/terrorism-indicators\/","title":{"rendered":"TERRORISM INDICATORS"},"content":{"rendered":"<p>Terrorist groups often\u00a0initiate attacks\u00a0during the anniversaries of significant events.\u00a0 This month is the\u00a0anniversary of the death of Osama Bin Laden.\u00a0 Though no information has been announced that a strike within the United States is imminent, the potential for terrorism remains.\u00a0 To help improve our ability to detect possible\u00a0terrorist threats against our communities, CODE BLUE\u00a0would like you to be aware of\u00a0the following indicators of\u00a0 terrorist activity:<\/p>\n<p>\u00a01. <strong><span style=\"text-decoration: underline\">Surveillance<\/span><\/strong>: The targeted area is watched and studied carefully by the terrorists. This may include persons recording or monitoring campus activities from positions on or near the intended target.<\/p>\n<p>2. <strong><span style=\"text-decoration: underline\">Elicitation<\/span><\/strong>: Information is gathered from members of the community that is specific to the intended target. This may be done by mail, phone, or in person.\u00a0 An example is the questioning of community members\u00a0regarding details of security\u00a0measures at the target asrea.<\/p>\n<p>3. <strong><span style=\"text-decoration: underline\">Tests of security<\/span><\/strong>: Local security measures are tested and analyzed by the terrorists, including measuring reaction times to security breaches or attempts to penetrate security.<\/p>\n<p>4. <strong><span style=\"text-decoration: underline\">Funding<\/span><\/strong>: Raising, transferring, spending money, which may include selling drugs or stolen merchandise, funneling money through businesses or charities.<\/p>\n<p>5. <strong><span style=\"text-decoration: underline\">Acquiring supplies<\/span><\/strong>: Necessary supplies are gathered to prepare the attack, including weapons\/weapon components, transportation, and communications.\u00a0Purchasing of these supplies\u00a0with cash only is another indicator.<\/p>\n<p>6. <strong><span style=\"text-decoration: underline\">Impersonation or suspicious people who don\u2019t belong<\/span><\/strong>: People impersonating roles to gain access or information and people who don\u2019t fit in or don\u2019t seem to belong in the location.<\/p>\n<p>7. <strong><span style=\"text-decoration: underline\">Rehearsal and dry runs<\/span><\/strong>: Groups or individuals will often\u00a0conduct test runs before the actual attack.<\/p>\n<p>8. <strong><span style=\"text-decoration: underline\">Deployment<\/span><\/strong>: The final and most urgent phase when terrorists are deploying assets and getting into position. Attack is imminent.<\/p>\n<p>\u00a0The presence of one or more of these signs may indicate the possibility of a terrorist attack.\u00a0 Be observant and immediately report these types of activities to 9-1-1.\u00a0\u00a0 Such reports can help investigators piece together potential terrorist plots.<\/p>\n<p>Our northern New Jersey\/NYC metropolitan area\u00a0area has\u00a0numerous potential targets of terrorism: transportation systems, large places of public assembly, industrial complexes,\u00a0public utilities, shopping malls, educational facilities, etc.<\/p>\n<p>IF YOU SEE SOMETHING&#8230;SAY SOMETHING!!!<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Terrorist groups often\u00a0initiate attacks\u00a0during the anniversaries of significant events.\u00a0 This month is the\u00a0anniversary of the death of Osama Bin Laden.\u00a0 Though no information has been announced that a strike within the United States is imminent, the potential for terrorism remains.\u00a0 To help improve our ability to detect possible\u00a0terrorist threats against our communities, CODE BLUE\u00a0would like [&hellip;]<\/p>\n","protected":false},"author":210,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[4,1],"tags":[],"class_list":["post-239","post","type-post","status-publish","format-standard","hentry","category-general-posts","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/codeblue\/wp-json\/wp\/v2\/posts\/239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/codeblue\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.shu.edu\/codeblue\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/codeblue\/wp-json\/wp\/v2\/users\/210"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/codeblue\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":4,"href":"https:\/\/blogs.shu.edu\/codeblue\/wp-json\/wp\/v2\/posts\/239\/revisions"}],"predecessor-version":[{"id":243,"href":"https:\/\/blogs.shu.edu\/codeblue\/wp-json\/wp\/v2\/posts\/239\/revisions\/243"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/codeblue\/wp-json\/wp\/v2\/media?parent=239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.shu.edu\/codeblue\/wp-json\/wp\/v2\/categories?post=239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.shu.edu\/codeblue\/wp-json\/wp\/v2\/tags?post=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}