WEBVTT 1 00:00:02.300 --> 00:00:07.549 What would you do if this occurred one 2 00:00:04.640 --> 00:00:09.650 day at your work? In this scenario you 3 00:00:07.549 --> 00:00:11.330 work at a home building supply, and a 4 00:00:09.650 --> 00:00:13.639 customer would like to purchase some 5 00:00:11.330 --> 00:00:16.279 one-inch steel pipe, have it cut into 6 00:00:13.639 --> 00:00:17.240 pieces, and have all the ends threaded 7 00:00:16.279 --> 00:00:19.280 for endcaps. 8 00:00:17.240 --> 00:00:21.170 Or what if you work for a gun store, or 9 00:00:19.280 --> 00:00:23.270 an explosives retailer, and you get a 10 00:00:21.170 --> 00:00:25.789 call from an individual inquiring about 11 00:00:23.270 --> 00:00:27.530 fastburning fuses, and what kind of 12 00:00:25.789 --> 00:00:29.960 identification is required to make such 13 00:00:27.530 --> 00:00:31.699 a purchase. During this call you feel the 14 00:00:29.960 --> 00:00:33.440 caller is suspicious and clearly 15 00:00:31.699 --> 00:00:35.540 unfamiliar with the products he's trying 16 00:00:33.440 --> 00:00:37.400 to buy. You should follow your company 17 00:00:35.540 --> 00:00:39.800 policy on reporting suspicious activity 18 00:00:37.400 --> 00:00:41.630 to law enforcement authorities. If your 19 00:00:39.800 --> 00:00:43.640 company is not a participant in the 20 00:00:41.630 --> 00:00:46.100 Bomb-Making Materials Awareness Program (or BMAP), 21 00:00:43.640 --> 00:00:48.260 you should first discuss 22 00:00:46.100 --> 00:00:52.930 what you observed with your supervisor 23 00:00:48.260 --> 00:00:55.210 prior to reporting to any outside agency. 24 00:00:52.930 --> 00:00:56.650 Once notified, law enforcement 25 00:00:55.210 --> 00:00:58.690 authorities will be able to check 26 00:00:56.650 --> 00:01:00.760 additional databases available to vet 27 00:00:58.690 --> 00:01:02.140 the suspicious behavior including 28 00:01:00.760 --> 00:01:05.020 criminal intelligence information 29 00:01:02.140 --> 00:01:08.110 databases, as well as classified national 30 00:01:05.020 --> 00:01:10.180 security intelligence information. Your 31 00:01:08.110 --> 00:01:12.010 information about suspicious activities 32 00:01:10.180 --> 00:01:15.010 could be the key piece of information 33 00:01:12.010 --> 00:01:16.750 needed to connect the dots. Your 34 00:01:15.010 --> 00:01:18.700 information could be the information 35 00:01:16.750 --> 00:01:21.310 that actually identifies a specific 36 00:01:18.700 --> 00:01:24.010 person or persons with the intent to 37 00:01:21.310 --> 00:01:26.620 commit a terrorist act. 38 00:01:24.010 --> 00:01:28.930 This scenario represents another real 39 00:01:26.620 --> 00:01:31.870 event and provides an example of best 40 00:01:28.930 --> 00:01:34.420 practices. A gun store in one location 41 00:01:31.870 --> 00:01:37.480 was contacted and asked about fast 42 00:01:34.420 --> 00:01:39.730 burning fuses. Shortly thereafter, in a 43 00:01:37.480 --> 00:01:41.530 separate location, a home building supply 44 00:01:39.730 --> 00:01:43.780 store had a customer requesting to 45 00:01:41.530 --> 00:01:46.270 purchase sections of steel pipe threaded 46 00:01:43.780 --> 00:01:48.090 on both ends for end caps. These 47 00:01:46.270 --> 00:01:50.680 activities were reported to authorities. 48 00:01:48.090 --> 00:01:53.160 The information was shared to fusion 49 00:01:50.680 --> 00:01:55.240 centers across the nation and the FBI. 50 00:01:53.160 --> 00:01:57.010 Analysts vetting the information 51 00:01:55.240 --> 00:01:59.320 discovered that criminal intelligence 52 00:01:57.010 --> 00:02:02.320 information existed on the individual in 53 00:01:59.320 --> 00:02:04.510 question. Connecting the dots revealed 54 00:02:02.320 --> 00:02:06.670 that these activities were all conducted 55 00:02:04.510 --> 00:02:07.230 by the same individual leading to an 56 00:02:06.670 --> 00:02:10.270 arrest. 57 00:02:07.230 --> 00:02:12.640 Awareness, observation, and reporting were 58 00:02:10.270 --> 00:02:14.620 key to the prevention of a probable 59 00:02:12.640 --> 00:02:17.080 bombing attack. 60 00:02:14.620 --> 00:02:19.360 The observed behaviors exemplified in 61 00:02:17.080 --> 00:02:22.180 this scenario are reasonably indicative 62 00:02:19.360 --> 00:02:24.849 of pre-operational planning associated 63 00:02:22.180 --> 00:02:27.160 with a terrorist act. These activities 64 00:02:24.849 --> 00:02:30.060 are indicators and behaviors noted in 65 00:02:27.160 --> 00:02:32.890 the ISE SAR functional standard. 66 00:02:30.060 --> 00:02:35.010 Materials acquisition and storage, the 67 00:02:32.890 --> 00:02:37.299 steel piping, eliciting information, 68 00:02:35.010 --> 00:02:40.360 inquiring about items and how to obtain 69 00:02:37.299 --> 00:02:42.400 them; these activities should be reported 70 00:02:40.360 --> 00:02:46.950 to authorities by contacting local law enforcement, a fusion center, or the FBI.