Skip to main content


If you see anything of a suspicious nature, please report it by calling the FBI at 704-672-6100, or in case of emergency call 911

Time has proven that the threat of terrorism endures today, in all corners of our great nation and the world.  With the hard lesson of the many lives lost, the Department of Justice has employed new and innovative approaches, together with federal, state, local, and tribal partners to proactively detect, disrupt, and dismantle terrorism plots before tragedies occur.  The United States Attorney’s Office for the District of North Carolina established the Anti-Terrorism Advisory Council (ATAC) to prepare, prevent, and prosecute all who target innocent Americans with the scourge of terrorism.  Through information sharing, awareness initiatives, and training events, the ATAC seeks to equip law enforcement, first responders, and community leaders with the tools necessary to confront extremism wherever it exists, while also preserving the constitutional liberties that all Americans cherish. 

The ATAC coordinator for WDNC is Assistant United States Attorney Robert Gleason.  Mr. Gleason coordinates not only with North Carolina members of the ATAC, but also with national-level anti-terrorism representatives from the Department of Justice and other agencies charged with protecting the American public. The ATAC also recognizes that the public continues to be our greatest information asset.  Remember, terrorism can happen.  Listed below are activities that can be considered indicators of possible pre-terrorism activity that should be reported to law enforcement.


"Pre-Incident Indicators"

- The first step is knowing what to look for.

Someone recording or monitoring activities, including the use of cameras (both still and video), note taking, drawing diagrams, writing on maps, or using binoculars or any other vision-enhancing device.

Anyone or any organization attempting to gain information by mail, fax, telephone,or in person about military operations or people

Tests of Security
Any attempts to measure reaction times to security breaches or to penetrate physical security barriers or procedures

Acquiring Supplies
Purchasing or stealing explosives, weapons, ammunition, uniforms, decals, flight manuals, passes or badges (or the equipment to manufacture them), or any other controlled items

Suspicious Persons
Out of Place

People who don't seem to belong in the workplace, neighborhood, business establishment, or anywhere else. This also includes suspicious border crossings, stowaways aboard ship, or people jumping ship in port.

Dry Run
Putting people into position and moving them about without actually committing a terrorist act such as a kidnapping or bombing. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow.

Deploying Assets
People and supplies getting into position to commit the act. This is the last opportunity to alert authorities before the terrorism occurs.


Updated March 22, 2021