Category |
Description |
Breach, Attempted
Intrusion, and/or Interference |
Unauthorized personnel
attempting to or actually entering a restricted area or secure site
relating to a transportation facility or conveyance owned,
operated, or used by an owner/operator subject to this part. This
includes individuals entering or attempting to enter by
impersonation of authorized personnel (for example,
police/security, janitor, vehicle owner/operator). Activity that
could interfere with the ability of employees to perform duties to
the extent that security is threatened. |
Misrepresentation |
Presenting false, or misusing,
insignia, documents, and/or identification, to misrepresent one's
affiliation with an owner/operator subject to this part to cover
possible illicit activity that may pose a risk to transportation
security. |
Theft, Loss,
and/or Diversion |
Stealing or diverting
identification media or badges, uniforms, vehicles, keys, tools
capable of compromising track integrity, portable derails,
technology, or classified or sensitive security information
documents which are proprietary to the facility or conveyance
owned, operated, or used by an owner/operator subject to this
part. |
Sabotage,
Tampering, and/or Vandalism |
Damaging, manipulating, or
defeating safety and security appliances in connection with a
facility, infrastructure, conveyance, or routing mechanism,
resulting in the compromised use or the temporary or permanent loss
of use of the facility, infrastructure, conveyance or routing
mechanism. Placing or attaching a foreign object to a rail
car(s). |
Cyber Attack |
Compromising, or attempting to
compromise or disrupt the information/technology infrastructure of
an owner/operator subject to this part. |
Expressed or
Implied Threat |
Communicating a spoken or
written threat to damage or compromise a
facility/infrastructure/conveyance owned, operated, or used by an
owner/operator subject to this part (for example, a bomb threat or
active shooter). |
Eliciting
Information |
Questioning that may pose a
risk to transportation or national security, such as asking one or
more employees of an owner/operator subject to this part about
particular facets of a facility's conveyance's purpose, operations,
or security procedures. |
Testing or Probing
of Security |
Deliberate interactions with
employees of an owner/operator subject to this part or challenges
to facilities or systems owned, operated, or used by an
owner/operator subject to this part that reveal physical,
personnel, or cyber security capabilities. |
Photography |
Taking photographs or video of
facilities, conveyances, or infrastructure owned, operated, or used
by an owner/operator subject to this part in a manner that may pose
a risk to transportation or national security. Examples include
taking photographs or video of infrequently used access points,
personnel performing security functions (for example, patrols,
badge/vehicle checking), or security-related equipment (for
example, perimeter fencing, security cameras). |
Observation or
Surveillance |
Demonstrating unusual interest
in facilities or loitering near conveyances, railcar routing
appliances or any potentially critical infrastructure owned or
operated by an owner/operator subject to this part in a manner that
may pose a risk to transportation or national security. Examples
include observation through binoculars, taking notes, or attempting
to measure distances. |
Materials
Acquisition and/or Storage |
Acquisition and/or storage by
an employee of an owner/operator subject to this part of materials
such as cell phones, pagers, fuel, chemicals, toxic materials,
and/or timers that may pose a risk to transportation or national
security (for example, storage of chemicals not needed by an
employee for the performance of his or her job duties). |
Weapons Discovery,
Discharge, or Seizure. |
Weapons or explosives in or
around a facility, conveyance, or infrastructure of an
owner/operator subject to this part that may present a risk to
transportation or national security (for example, discovery of
weapons inconsistent with the type or quantity traditionally used
by company security personnel). |
Suspicious Items
or Activity |
Discovery or observation of
suspicious items, activity or behavior in or around a facility,
conveyance, or infrastructure of an owner/operator subject to this
part that results in the disruption or termination of operations
(for example, halting the operation of a conveyance while law
enforcement personnel investigate a suspicious bag, briefcase, or
package). |