The FBI has released a document identifying suspected terrorists. You may qualify.
Who are terrorists?
________________________________________________________
People Who:
Are overly concerned about privacy, attempts to shield the screen from view of others
Always pay cash or use credit card(s) in different name(s). . . .
Activities on Computer indicate:
Evidence of a residential based internet provider (signs on to Comcast, AOL, etc.)
Use of anonymizers, portals, or other means to shield IP address
Suspicious or coded writings, use of code word sheets, cryptic ledgers, etc.
Encryption or use of software to hide encrypted data in digital photos, etc. . . .
Be part of the solution.
Gather information about individuals without drawing attention to yourself
Identify license plates, vehicle description, names used, languages spoken, ethnicity, etc. . . .
If something seems wrong, notify law enforcement authorities.
Do not jeopardize your safety or the safety of others.
Preventing terrorism is a community effort.
By learning what to look for, you can make a positive contribution in the fight against terrorism. The partnership between the community and law enforcement is essential to the success of anti-terrorism efforts.
Some of the activities, taken individually, could be innocent and must be examined by law enforcement professionals in a larger context to determine whether there is a basis to investigate. The activities outlined on this handout are by no means all-inclusive but have been compiled from a review of terrorist events over several years. _____________________________________________
For more details, click the link.
Continue reading on info.publicintelligence.net.
________________________________
Published February 7, 2012. The original is here.
© 2022 GaryNorth.com, Inc., 2005-2021 All Rights Reserved. Reproduction without permission prohibited.