
Suspicious Behaviour in the Context of Terrorism
Suspicious behaviour related to terrorist activity can be subtle or overt, and recognising it is key to prevention and public safety.
Summary
This document outlines key indicators of suspicious behaviour that may be related to terrorist activity, such as surveillance, testing security, acquiring supplies, suspicious financial transactions, radical shifts in behaviour, dry runs, and unusual travel patterns. It provides practical tips for identifying and reporting such behaviours, emphasising the importance of trusting instincts, observing patterns, and sharing details with authorities via emergency services or dedicated hotlines, particularly in the UK.
Here's a breakdown of what to look for and how to spot it:
What Is Suspicious Behaviour in the Context of Terrorism?
Suspicious behaviour refers to actions that seem out of place, unusual, or potentially harmful, especially when they align with known patterns of terrorist planning or activity. These behaviours may include:
1. Surveillance or Reconnaissance
-
Taking photos or videos of security features, entrances, exits, or critical infrastructure.
-
Asking detailed questions about building operations, security procedures, or personnel.
-
Loitering near sensitive areas without a clear purpose.
-
2. Testing Security
-
Attempting to enter restricted areas without authorisation.
-
Triggering alarms or security responses to observe reactions.
-
Leaving bags or packages unattended to see how authorities respond.
-
3. Acquiring Supplies
-
Purchasing large quantities of chemicals, weapons, or materials that could be used to make explosives.
-
Using false identification or paying in cash for suspicious items.
-
Renting vehicles or storage units under unusual circumstances.
-
4. Suspicious Financial Transactions
-
Large cash withdrawals or deposits are inconsistent with normal behaviour.
-
Transfers to or from high-risk countries or flagged organisations.
-
Use of multiple bank accounts or shell companies.
-
5. Radical or Concerning Behaviour
-
Expressing extremist views or support for terrorist groups.
-
Sudden changes in behaviour, appearance, or social circles.
-
Isolation from family or community, especially after expressing ideological shifts.
-
6. Dry Runs or Practice Runs
-
Rehearsing an attack scenario without executing it.
-
Visiting a target location multiple times with different disguises or vehicles.
-
7. Unusual Travel Patterns
-
Travelling to or from conflict zones or countries known for terrorist activity.
-
Booking one-way tickets or last-minute travel with no clear reason.
How to Spot Suspicious Behaviour
Here are some practical tips:
-
Trust your instincts: If something feels off, it’s worth reporting.
-
Look for patterns: One odd action might be harmless, but repeated or coordinated behaviour could be a red flag.
-
Note details: Time, location, appearance, vehicle info, and behaviour are all useful to authorities.
-
Don’t intervene directly: Report to local law enforcement or counter-terrorism hotlines.
-
Who to Contact
In the UK, for example:
-
Call 999 in an emergency.
-
Call 0800 789 321 to report suspicious activity to the UK’s Counter Terrorism Hotline.
-
Use the ACT (Action Counters Terrorism) website to report online.
Protect Your Town ©2025
What are the 13 sectors listed as critical national infrastructure in the UK?
The UK's official 13 CNI sectors include energy, water, communications, healthcare, transportation, financial services, and emergency services, as well as government, food, civil nuclear, space, chemicals, and defence.24 Jul 2025
How to check gates around our infrastructures are secure:
To conduct a thorough security check on a gate and fence, focus on the gate's functionality, the fence's integrity, and the surrounding area for potential vulnerabilities. Inspect the gate for smooth operation, secure locking mechanisms, and robust construction. Check the fence for damage, gaps, and climbing hazards, and consider enhancing it with security features like alarms or thorny plants.
Here's a more detailed breakdown:
Gate Security:
Functionality:
Ensure the gate opens and closes smoothly without sticking or veering off track.
Lubricate moving parts if necessary to prevent friction and ensure smooth operation.
Check the gate's tracking system to ensure it's properly aligned and secure.
Locking Mechanisms:
Verify that the gate lock is functioning correctly and is of adequate strength.
Consider adding a sliding bolt, barrel bolt, or other secure locking mechanism for enhanced security.
Ensure the lock is not easily bypassed or compromised.
Construction:
Assess the gate's overall strength, considering the thickness of the backing rails and frame.
Look for any signs of damage, such as corrosion, cracks, or rot, especially in the frame or top of the gate.
Consider reinforcing the gate with hardwood and strong wood glue to prevent water ingress and rot.
Fence Security:
Structural Integrity:
Inspect the fence for damage, such as breaks, gaps, or leaning sections.
Ensure the fence is securely anchored to the ground and posts are stable.
Consider the fence's height and the material used, as some are easier to climb or breach than others.
Climbing Hazards:
Identify any areas where the fence is low or easily climbed.
Consider adding trellis, thorny plants, or anti-climb topping to make it more difficult to scale.
Plant prickly or barbed shrubbery along the fence line for added security.
Perimeter Security:
Check for any areas where the fence line is easily accessible from neighbouring properties or public areas.
Ensure that there are no tools or equipment left outside that could be used to breach the fence.
Consider installing motion-sensor lights to deter intruders and alert you to any activity.




