Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

 
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium Businesses
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
    Work @ CISA
  • About
    Culture
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Contact Us
    Site Links
    CISA Administrative Subpoena
    Reporting Employee and Contractor Misconduct
    CISA GitHub
    Signature Verification
    Subpoena Process
Report a Cyber Issue
Breadcrumb
  1. Home
  2. Topics
  3. Physical Security
Share:
Red and blue cyber node design

Non-Confrontational Techniques

A single individual can help deter threats and prevent harm by spotting suspicious activity and reporting it.

Physical Security

  • Active Shooter Preparedness
  • Bombing Prevention
  • Insider Threat Mitigation
  • Non-Confrontational Techniques
  • Protecting Houses of Worship
  • School Safety
  • Securing Public Gatherings
  • Unmanned Aircraft Systems
  • Vehicle Ramming Mitigation

Overview

Industries face a variety of threats - both internal and external - from hostile governments, terrorist groups, disgruntled employees, and malicious introducers. Alert employees can spot suspicious activity and report it. The power is in the employee, citizen, patron, or any person who can observe and report. 

CISA’s Role

CISA offers a variety of tools and resources to empower and educate employees, citizens, patrons, or any person with the skills and support they need to identify and report suspicious behavior. CISA recognizes the power that a single individual can have in deterring threats and preventing harm. CISA’s non-confrontational techniques are tailored to harness the power of the individual in the securing the safety of our nation.

Featured Content

Power of Hello

The OHNO approach – Observe, Initiate a Hello, Navigate the Risk, and Obtain Help – helps employees observe and evaluate suspicious behaviors, and empowers them to mitigate potential risk, and obtain help when necessary.

Insider Threat Mitigation

An insider is any person who has or had authorized access to or knowledge of an organization’s resources. Insider threat is the potential for an insider to use their authorized access or understanding of an organization to harm that organization. 

De-escalation Series

The assessment process of the De-Escalation series determines whether an emergency response is needed, if de-escalation is possible, or if a more formal assessment is needed.

Pathway to Violence

The "Pathway to Violence" provides information regarding the behavior indicators that assailants often demonstrate before a violent act.

Resources

Power of Hello Placemat

PUBLICATION
The Power of Hello Placemat provides stakeholders with information to assist in identifying and effectively responding to suspicious behavior.
Download File (PDF, 313.91 KB)

Power of Hello Slick Sheet

PUBLICATION
The CISA Power of Hello Slick Sheet provides stakeholders with information to assist in identifying and effectively responding to suspicious behavior.
Download File (PDF, 272.54 KB)

De-escalation Series

SEP 21, 2021 | PUBLICATION
The assessment process of the De-Escalation series determines whether an emergency response is needed, if de-escalation is possible, or if a more formal assessment is needed.
View Files

Pathway to Violence

PUBLICATION
The "Pathway to Violence" provides information regarding the behavior indicators that assailants often demonstrate before a violent act.
Download File (PDF, 623.3 KB)

Translated Resources

Explore our Power of Hello and De-Escalation Series resources, both of which are available in a variety of translations.

Power of Hello Translated Resources

The Power of Hello products provide stakeholders with information to assist in identifying and effectively responding to suspicious behavior. 

De-Escalation Series Translations

The De-Escalation Series helps critical infrastructure owners, operators, and staff identify and navigate suspicious activity or potentially escalating situations as well as safely dis-engage and report these situations.

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 888-282-0870 Central@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Accessibility
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • The White House
  • USA.gov
  • Website Feedback