Breach/Attempted Intrusion
|
Unauthorized personnel attempting to or actually entering a restricted area or protected site. Impersonation of authorized personnel (e.g. police/security, janitor).
|
Misrepresentation
|
Presenting false or misusing insignia, documents, and/or identification, to misrepresent one’s affiliation to cover possible illicit activity.
|
Theft/Loss/Diversion
|
Stealing or diverting something associated with a facility/infrastructure (e.g., badges, uniforms, identification, emergency vehicles, technology or documents {classified or unclassified}, which are proprietary to the facility).
|
Sabotage/Tampering/ Vandalism
|
Damaging, manipulating, or defacing part of a facility/infrastructure or protected site.
|
Cyber Attack
|
Compromising, or attempting to compromise or disrupt an organization’s information technology infrastructure.
|
Expressed or Implied Threat
|
Communicating a spoken or written threat to damage or compromise a facility/infrastructure.
|
Aviation Activity
|
Operation of an aircraft in a manner that reasonably may be interpreted as suspicious, or posing a threat to people or property. Such operation may or may not be a violation of Federal Aviation Regulations.
|
Eliciting Information
|
Questioning individuals at a level beyond mere curiosity about particular facets of a facility’s or building’s purpose, operations, security procedures, etc., that would arouse suspicion in a reasonable person.
|
Testing or Probing of Security
|
Deliberate interactions with, or challenges to, installations, personnel, or systems that reveal physical, personnel or cyber security capabilities.
|
Recruiting
|
Building of operations teams and contacts, personnel data, banking data or travel data
|
Photography
|
Taking pictures or video of facilities, buildings, or infrastructure in a manner that would arouse suspicion in a reasonable person. Examples include taking pictures or video of infrequently used access points, personnel performing security functions (patrols, badge/vehicle checking), security-related equipment (perimeter fencing, security cameras), etc.
|
Observation/Surveillance
|
Demonstrating unusual interest in facilities, buildings, or infrastructure beyond mere casual or professional (e.g. engineers) interest such that a reasonable person would consider the activity suspicious. Examples include observation through binoculars, taking notes, attempting to measure distances, etc.
|
Materials Acquisition/Storage
|
Acquisition and/or storage of unusual quantities of materials such as cell phones, pagers, fuel, chemicals, toxic materials, and timers, such that a reasonable person would suspect possible criminal activity.
|
Acquisition of Expertise
|
Attempts to obtain or conduct training in security concepts; military weapons or tactics; or other unusual capabilities that would arouse suspicion in a reasonable person.
|
Weapons Discovery
|
Discovery of unusual amounts of weapons or explosives that would arouse suspicion in a reasonable person.
|
Sector-Specific Incident
|
Actions associated with a characteristic of unique concern to specific sectors (such as the public health sector), with regard to their personnel, facilities, systems or functions.
|
FDLE is composed of five areas: Executive Direction and Business Support, Criminal Investigations and Forensic Science, Criminal Justice Information, Criminal Justice Professionalism and Florida Capitol Police. FDLE’s duties, responsibilities and procedures are mandated through Chapter 943, FS, and Chapter 11, FAC. To learn more about these areas, read our Statement of Agency Organization and Operation or visit our Open Government page.