See It. Assess It. Report It.
Threat awareness is the ability to identify, assess, and respond to potential dangers before they escalate into incidents. It is a core competency for anyone responsible for safety and security.
Learning Objectives:
Recognizing how threats manifest
Threats come in many forms. Understanding the categories helps you spot them faster and respond appropriately.
Pre-attack behaviors based on FBI/DHS research
Research into targeted violence consistently shows that attackers exhibit observable warning behaviors before acting. Recognizing these patterns is critical to prevention.
A mental readiness framework for security professionals
Developed by Lt. Col. Jeff Cooper, this color code system describes four levels of mental alertness. It helps you calibrate your awareness to match your environment.
Evaluating your environment for vulnerabilities
A security-aware professional knows their environment inside and out. Use this checklist-based approach to assess any site, informed by Crime Prevention Through Environmental Design (CPTED) principles.
Knowing what to look for
Suspicious activity is any observed behavior that could indicate a person is planning or committing a crime or attack. It is based on what someone is doing, not on how they look.
How threats exploit human trust
Social engineering bypasses physical security by manipulating people. Attackers exploit natural human tendencies like helpfulness, obedience to authority, and the desire to avoid conflict.
Creating a fabricated scenario to gain trust or access. Examples: "I'm the new IT technician." "I left my badge inside." "I'm here to meet John in accounting." Always verify the story through an independent channel before granting access.
Following an authorized person through a secured door. They may carry large boxes so you hold the door, or simply walk closely behind you. Never hold doors for unauthorized individuals, even if it feels rude. Direct them to the front desk.
Wearing fake uniforms, badges, or claiming to be inspectors, executives, or law enforcement. People tend to comply with perceived authority figures without questioning. Always verify credentials through official channels.
One person creates a commotion or draws attention while an accomplice slips past security. Staged arguments, medical emergencies, or loud disruptions can all be cover for unauthorized entry. Maintain security posture even during distractions.
Casually asking employees about schedules, security protocols, building layouts, or personnel details. It may feel like friendly conversation, but the information can be used for reconnaissance. Be mindful of what you share and with whom.
A structured approach to evaluating threats
When you observe something concerning, use this five-step process to organize your thinking before reporting. You are not expected to make the final call on threat level, but clear observations help those who do.
Record the specific words, actions, or behaviors you observed. Be factual and precise. "He said he would 'make everyone pay'" is more useful than "He was being weird." Stick to observable facts, not assumptions.
Does the person have the physical ability, resources, or access to follow through? A threat from someone with known access to weapons or restricted areas is more credible than a vague statement from a stranger passing by.
Consider context and history. Is this an isolated outburst or part of an escalating pattern? Have they made similar statements before? Are they taking steps that align with their words (acquiring materials, conducting surveillance)?
Capability includes physical means (weapons, tools), knowledge (training, expertise), and opportunity (access to the target). Someone who has all three represents a significantly higher risk than someone with only one.
Even if you are unsure about steps 2-4, report what you observed. Trained threat assessment professionals have tools, databases, and context you don't. Your observation could be the missing piece that completes a larger picture.
How to report effectively
A well-communicated report can be the difference between a prevented incident and a missed opportunity. Reporting is the most important action you can take.
Practical steps to keep yourself safe
Awareness without a plan is incomplete. Personal safety planning ensures you can act quickly and decisively when it matters most.
Your quick reference summary
Core principles of threat awareness:
Calculating your results...