The FBI has released a document identifying suspected terrorists. You may qualify.
Who are terrorists?
Are overly concerned about privacy, attempts to shield the screen from view of
Always pay cash or use credit card(s) in different name(s). . . .
Activities on Computer indicate:
Evidence of a residential based internet provider (signs on to Comcast, AOL,
Use of anonymizers, portals, or other means to shield IP address
Suspicious or coded writings, use of code word sheets, cryptic ledgers, etc.
Encryption or use of software to hide encrypted data in digital photos, etc. . . .
Be part of the solution.
Gather information about individuals without drawing attention to yourself
Identify license plates, vehicle description, names used, languages spoken, ethnicity, etc. . . .
If something seems wrong, notify law enforcement authorities.
Do not jeopardize your safety or the safety of others.
Preventing terrorism is a community effort.
By learning what to look for, you can make a positive contribution in the fight against terrorism. The partnership between the community and law enforcement is
essential to the success of anti-terrorism efforts.
Some of the activities, taken individually, could be innocent and must be examined by law enforcement professionals in a larger context to determine whether there is a basis to investigate. The activities outlined on this handout are by no means
all-inclusive but have been compiled from a review of terrorist events over several years.
For more details, click the link.