Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Topics
  3. Physical Security
  4. Bombing Prevention
  5. Suspicious Activity and Items
Share:
Blue background design

Suspicious Activity and Items

Learn how to recognize unusual behaviors and suspicious items typically associated with Improvised Explosive Device (IED) threats.

Bombing Prevention

  • Bomb Threats
  • Suspicious Activity and Items
  • IED Awareness
  • Protective Measures
  • Planning and Preparedness

What to Do: Suspicious Activity and Items

Understanding Suspicious Activity and Items

Suspicious activity can refer to any incident, event, behavior, or activity that seems unusual or out of place. Terrorists and criminals often conduct specific activities as they plan a bombing attack. These activities can include, but are not limited to, eliciting information, testing or probing of security, and observation/surveillance. If you recognize these specific activities, your actions may help prevent such an occurrence. 

A suspicious item is anything such as a package or a vehicle that has indications that it might contain an explosive device or hazardous material. It may be suspiciously placed in proximity to people or valuable assets, and it could have characteristics like wires, electronics or unusual sounds, powders or odors. 

Read more
Identifying Suspicious Activity

The acronym B.O.M.B.E.R. is a tool you can use to assess your surroundings, identify suspicious activity, and help prevent a potential bombing incident.

  • Baseline - Establish a baseline of what normal behaviors and activities look like for your location. Anything outside of the “norm” can be considered suspicious.
  • Operational Indicators - A bombing attack requires a planning process that may include the following operational indicators: surveillance, target selection, testing or probing security, and practice runs.
  • Materials - Terrorists and criminals acquire materials to create a homemade or improvised explosive device. Some of these can be ordinary items while others are carefully monitored or controlled.
  • Bomb-Building Activity - Potential indicators of bomb-building activity include evidence of bomb-making research, testing of mixtures or devices, and chemical exposure such as stains or burns.
  • Elicitation - Elicitation is an attempt to discreetly gain information by asking questions about a place, person, or operation. Elicitation often appears as normal social or professional conversation.
  • Respond - Report suspicious activity. When a suspicious incident occurs, be observant so you can provide a detailed report. Public safety and security are everyone’s responsibility.

It is important to remember that just because someone’s speech, beliefs, appearance, or way of life are different, it does not mean that individual is suspicious. Factors such as race, ethnicity, and/or religious affiliation are NOT suspicious.

Read more
Identifying Suspicious Items

The acronyms H.O.T. and R.A.I.N. can be used to safely determine if an item is a serious threat or just unattended. Criminals or terrorists sometimes conceal Improvised Explosive Devices (IEDs) in backpacks, suitcases, or common items.

  • Is it H.O.T.? If yes to the questions below, use R.A.I.N. If no to the questions below, treat the item with caution, try to determine the owner, and report to an authority. 
    • Hidden - Placed out of sight or appears purposedly concealed. 
    • Obviously Suspicious - Unexplainable wires or electronics or bomb-like components. 
    • not Typical - Out of place for the location or potentially related to a threat. 
  • If an item is suspicious, you should: 
    • Recognize the indicators of a suspected explosive device
      • Indicators can be related to the characteristics, events, location, or time, including whether the item is Hidden, Obviously suspicious, or not Typical (HOT).
    • Avoid the area 
      • Don’t touch the suspected item. Instead, immediately move and direct others to move away immediately.
    • Isolate the suspected item 
      • Establish a perimeter to secure the area and continue to direct people away. Use frontal and overhead cover and if available wear personal protective equipment.
    • Notify Appropriate Emergency Services 
      • Describe the Suspicious items and persons, the person’s Actions, the Location of the item, the Time of placement and discovery, and Your actions to mitigate risk (SALTY).
Read more
Reporting Suspicious Activity and Items

If you witness suspicious activity, retain all information regarding the incident (such as usernames, email addresses, websites, phone numbers, or names of platforms, etc.) and report it to local law enforcement. 

If you come across a suspicious item, it is important to report it right away. Early detection can lead to the prevention of a bombing incident. If a suspicious item is discovered or the threat is elevated, it should be treated as an emergency by contacting 9-1-1. 

Read more

Featured Videos

Identifying Suspicious Activity

What to Do: Suspicious or Unattended Item

Bomb Threat Awareness for College Students

BMAP PSA 1 – Vigilant Neighbor

BMAP PSA 2 – Vigilant Manager

BMAP PSA 3 – Vigilant Employee

Training

Access training courses to recognize unusual behaviors and suspicious activity typically associated with a potential threat.

For more information about the Office for Bombing Prevention (OBP) Training Program and the types of courses we offer, visit the OBP Training page. 

Learn More

View All Suspicious Activity and Items Training
Training icon for Independent Study Training course

Bomb-Making Materials Awareness: Your Role Course (AWR-911)

INDEPENDENT STUDY | VIRTUAL/ONLINE
Uses an immersive, graphic novel style storytelling approach to educate and empower community members on how to identify and report suspicious activity and purchasing behaviors related to bomb-making materials.
Register
Training icon for Virtual-Instructor-Led Training course

Introduction to the Terrorist Attack Cycle Course (AWR-334)

CUSTOMIZABLE | VIRTUAL/ONLINE
Introduces steps involved in planning and executing terrorist attacks. Participants are provided with the understanding of how to prevent, protect against, respond to, and mitigate attacks that use IEDs.
Register
Training icon for in-person training course

Surveillance Detection for Bombing Prevention Course (PER-346)

CUSTOMIZABLE | IN-PERSON
Provides public safety and security professionals fundamental knowledge and skills to recognize and respond appropriately to hostile surveillance at facilities and planned and unplanned events.
Request Training
Training icon for Virtual-Instructor-Led Training course

Suspicious Activity Recognition for Bombing Prevention Course (AWR-943)

CUSTOMIZABLE | VIRTUAL/ONLINE
Provides public safety and security professionals with foundational knowledge to identify suspicious activity related to a facility/system or a planned or unplanned event.
View All Suspicious Activity and Items Training

Products

Recognize unusual behaviors typically associated with a potential threat via various resources.

View All Suspicious Activity and Items Products
Video Icon

Be Vigilant Training Video Series

VIDEO
Instructional videos that raise awareness about common everyday items that can be used as bomb-making materials.
Multiple Page Icon

Increase in Bomb Threats and Suspicious Packages

PUBLICATION
This guidance document provides an overview of bomb threats and suspicious mail/packages and includes recommended practices to mitigate the impacts associated with these threats.
Download File (PDF, 719.42 KB)
One Page Icon

Suspicious Mail or Packages Poster

PUBLICATION
This poster provides tips to determine if a piece of mail or package seems suspicious and it outlines steps you should follow in the event it is suspicious. 
Download File (PDF, 187.52 KB)
One Page Icon

Unattended vs. Suspicious Item Postcard and Poster

PUBLICATION
The Unattended vs. Suspicious Postcard and Poster provide information on how to safely determine if an item is a serious threat or just unattended. Generally speaking, anything that is Hidden, Obviously suspicious, and not Typical (HOT) should be deemed suspicious. 
View Files
View All Suspicious Activity and Items Products

Tools/Services

Using specific tools and services will help spot unusual behaviors related to a potential IED threat.

BMAP program teaser

Bomb-Making Materials Awareness Program (BMAP)

BMAP is a counter-terrorism risk management bombing prevention program. BMAP focuses on restricting access by malicious actors to explosive precursor chemicals, powders, target materials, associated components, and delivery methods.
Operation Flashpoint Logo

Operation Flashpoint

Operation Flashpoint is a CISA-FBI partnership designed to promote voluntary reporting of suspicious activity through outreach and awareness to private sector and public safety stakeholders in order to prevent acquisition of explosive precursor chemicals for nefarious use.
An illustration that says TRIPwire

Technical Resource for Incident Prevention (TRIPwire) Portal

SERVICE
TRIPwire is DHS' online, collaborative information-sharing and resource portal for bomb squads, emergency responders, military personnel, government officials, intelligence analysts, private sector security professionals, and critical infrastructure owners and operators.
TRIPwire Logo

TRIPwire

To access more bombing prevention resources, visit the Technical Resource for Incident Prevention (TRIPwire). TRIPwire is an online, collaborative information-sharing and resource portal designed to help prevent improvised explosive device incidents.

Learn More

Contact

To report suspicious activity, call 9-1-1 or contact local law enforcement.

For additional information about OBP resources, please contact your local Protective Security Advisor (PSA) or OBP directly at OBP@cisa.dhs.gov.

Informed, alert communities play a critical role in keeping our nation safe. Everyone has a responsibility to protect our nation—"If You See Something, Say Something."

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback