1. Surveillance: Recording or monitoring activities. May include drawing diagrams, note taking, use of cameras, binoculars or other vision-enhancing devices, or possessing floor plans or blueprints of key facilities. 2. Elicitation: Attempts to obtain operation, security, and personnel-related information regarding a key facility. May be made by mail, fax, e-mail, telephone, or in person. 3. Tests of Security: Attempts to measure reaction times to security breaches or to penetrate physical security barriers or procedures in order to assess strengths and weaknesses. 4. Acquiring Supplies: Attempts to improperly acquire items that could be used in a terrorist act. May include the acquisition of explosives, weapons, harmful chemicals, flight manuals, law enforcement or military equipment, uniforms, identification badges, or the equipment to manufacture false identification. 5. Suspicious Persons: Someone who does not appear to belong in a workplace, neighborhood or business establishment due to his/her behavior, including unusual questions or statements he/she make. 6. Dry Runs/Trial Runs: Behavior that appears to be preparation for a terrorist act without actually committing the act. Activity could include mapping out routes and determining the timing of traffic lights and flow. 7. Deploying Assets: Placing people, equipment, and supplies into position to commit the act. This is the last opportunity to alert authorities before the terrorist act occurs. http://www.vsp.state.va.us/FusionCenter/7-Signs.shtm [Broken] .