Someone recording or monitoring activities, this may include the use of cameras (either still or video), note taking, drawing diagrams, annotating on maps and use of binoculars.
People or organisations attempting to gain information about military operations, capabilities, or people. Elicitation attempts may be made by mail, fax, telephone, or in person.
Tests of security:
Terrorists often attempt to measure security levels or to penetrate physical, security barriers or procedures in order to assess strengths and weaknesses.
Acquiring military gear:
Terrorists purchase or steal explosives, weapons and ammunition.
Suspicious persons out of place:
Terrorists are people who do not seem to belong in the workplace, neighbourhood or anywhere else. This includes suspicious border crossings.
Dry run and trial run:
Terrorists put people in positions and move them around according to their plan, without actually committing the terrorist attack. This is especially true when planning a kidnap, but it can also pertain to bombings. This activity could also include mapping out routes and timing traffic lights and flow.
Deploying assets: People and supplies are positioned to commit the act.