- Stay alert. Always be aware of your environment. Be aware of any possible dangers and any possible safe spots in case an attack occurs.
- If You See Something, Say Something. Report suspicious activity to authorities.
- Learn lifesaving skills. Take trainings such as “You Are The Help Until Help Arrives” and learn first aid to assist injured before help arrives.
- Sign up for active shooter preparedness training. Check with your local police or sheriff’s office if there are any active shooter preparedness training events in your community.
Terrorism
Terrorism involves using force or violence against individuals or property, violating U.S. criminal laws, to instill fear, coerce, or demand ransom. Terrorists leverage threats to create public fear, make citizens feel powerless against terrorism, and gain quick publicity for their agendas.
Terrorism is constantly evolving, with threats originating both internationally and domestically. Tactics include biological agents, weapons, explosives, and cyber attacks. These threats aim to incite fear, undermine government authority, and draw media attention. Preparedness is key, although these scenarios are unpredictable and can rapidly change.
The attacks on the World Trade Center and the Pentagon on September 11, 2001, heightened awareness of terrorism for all Americans. Despite a lower threat level in Waukesha County, enhanced vigilance and awareness among citizens are crucial to addressing and preparing for potential terrorist threats.
If You See Something, Say Something
Every person has an important part to play in stopping terrorist activities. By staying alert, promptly reporting suspicious actions, and actively getting involved, we can greatly improve our shared safety against the threat of terrorism.
Signs of Suspicious Activity
Expressed or Implied Threat
Communicating a spoken or written threat to commit a crime that could harm or kill people or damage a facility, infrastructure or secured site.
Observation/Surveillance
A prolonged or unusual interest in facilities, buildings, or infrastructure beyond casual or professional interest, in a suspicious manner.
Photography
Taking pictures or videos of persons, facilities, buildings, or infrastructure in a covert manner, such as taking photos or video of security-related equipment or personnel, infrequently used access points or the structure of a building.
Theft/Loss/Diversion
Stealing or diverting items such as equipment, uniforms, or badges that belong to a facility or secured site.
Testing or Probing of Security
Challenging or testing a facility's security or IT systems to assess the strength or weakness of the target.
Aviation Activity
Operating or interfering with the operation of an aircraft that poses a threat of harm to people and property.
Breach/Attempted Intrusion
Unauthorized people trying to enter a restricted area or impersonating authorized personnel.
Misrepresentation
Presenting false information or misusing documents to conceal possible illegal activity.
Eliciting Information
Questioning personnel beyond mere curiosity about an event, facility, or operations.
Acquisition of Expertise
Gaining skills or knowledge on a specific topic, such as facility security, military tactics, or flying an aircraft.
Cyberattack
Disrupting or compromising an organization's information technology systems.
Recruiting/Financing
Funding suspicious activity or recruiting people to participate in criminal or terrorist activity.
Sabotage/Tampering/ Vandalism
Damaging or destroying part of a facility, infrastructure, or secured site.
Materials Acquisition/Storage
Acquisition and/or storage of unusual materials such as cell phones, radio controllers, or toxic materials.
Weapons Collection/Storage
Collection or discovery of unusual amounts of weapons including explosives, chemicals, or other destructive materials.
Sector-Specific Incident
Actions which raise concern to specific sectors, (e.g., power plant) with regard to their personnel, facilities, systems, or functions.
Reporting Suspicious Activity
Public safety is everyone’s responsibility. If you see suspicious activity, report it to local law enforcement or a person of authority. If you see suspicious activity, report it to law enforcement and describe specifically what you observed, including:
- Who or What you saw;
- When you saw it;
- Where it occurred; and
- Why it's suspicious.
If there is an emergency, call 9-1-1. Wisconsin has a unique “tip line” to collect reports of terrorism-related suspicious activity.
Active Shooter
An active shooter is an individual engaged in killing or attempting to kill people in a confined and public space. These situations are often over within 10 to 15 minutes before law enforcement arrives on the scene. There is no pattern or method to the selection of victims by an active shooter. People need to be prepared mentally and physically to deal with these situations.
Vehicle Attacks
When terrorists use vehicles to target pedestrians, breach security barriers, and deliver explosive devices
WHAT TO DO BEFORE, DURING, AND AFTER A MASS ATTACK
Bioterrorism
A biological attack is the deliberate release of germs or other biological substances that can make you sick. Biological agents can be spread by spraying them into the air, through person-to-person contact, infecting animals that carry the disease to humans, and by contaminating food and water.
Bacteria
Viruses
Toxins
WHAT TO DO BEFORE, DURING, AND AFTER A BIOLOGICAL ATTACK
Explosions
Explosive devices can be carried in a vehicle or by a person, delivered in a package, or concealed on roadsides. Terrorists have frequently used explosive devices as one of their most common weapons. These devices are highly portable and can easily be detonated from remote locations or by suicide bombers.
Bomb Threats
Follow these procedures:
- Remain calm
- Notify authorities immediately.
- Contact your facility supervisor, such as a manager or administrator.
- Call your local law enforcement or 911 if no facility supervisor is available.
- For threats via phone.
- Keep the caller on the line as long as possible. Be polite and show interest to keep them talking.
- DO NOT HANG UP, even if the caller does.
- If possible, signal or pass a note to other staff to listen and help notify authorities.
- Write down as much information as possible, caller ID number, exact wording of threat, type of voice, or behavior. Refer to the DHS Bomb Threat Checklist.
- Record the call if possible.
- For written threats.
- Handle the document as little as possible.
- Notify your facility supervisor and authorities.
- Write on a separate sheet of paper the date and time the document was found, rewrite the threat exactly, and any situations or conditions surrounding the delivery.
- If small and removable, place it in a bag or envelope.
- If large/stationary, secure the location.
- For emailed or posted on social media threats.
- Screengrab the message or leave the message open on your device.
- Notify your supervisor and authorities.
If You See a Suspicious Item
A suspicious item is any item that is reasonably believed to contain explosives, an improvised explosive device, or other hazardous materials that requires a bomb technician or specialized equipment to evaluate. Anything that is HOT (Hidden, Obviously suspicious, and not Typical) should be considered suspicious. Remember “If you see something, say something.”
If you encounter a suspicious item, use R.A.I.N.
- Recognize the indicators of a suspected explosive device. Indicators can be related to characteristics, events, locations, or time.
- Avoid the area. Do not touch the suspected item. Instead, immediately move and direct others to move away immediately.
- Isolate the suspected item. Establish a perimeter to secure people and continue to redirect people.
- Notify appropriate emergency services. Describe the suspicious items and persons, the person's actions, the location of the item, the time of placement and discovery, and your actions to mitigate risk.
