answersLogoWhite

0

Potential suspicious activities can sometimes lead to evidence or can sometimes turn out to be innocent.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What are the Antiterrorism Level I theme?

The Antiterrorism Level I theme focuses on increasing awareness of terrorism threats, identifying suspicious activities, and implementing measures to deter potential attacks. It also emphasizes the importance of reporting any suspicious behavior to authorities and fostering a culture of vigilance within organizations.


Which Congressional committee had the job of investigating suspicious secret activities of communists?

Un-American Activities Committee


What does the word suspicious mean?

The word 'suspicious' can indicate that a person is distrustful or skeptical (e.g. I was suspicious of his intentions), or that a person or situation looks a bit dodgy (His behavior was suspicious).


Do we say looking suspicious or acting suspicious?

We say "acting suspicious" to describe someone's behavior or actions that seem questionable or cause concern. On the other hand, "looking suspicious" may refer to someone's appearance that suggests potential wrongdoing, but the more common phrase is "acting suspicious."


What does sketchy mean?

It is a slang term that means suspicious.


What action should boat operators take to ensure the safety of everyone on the nation's waterways?

report suspicious activities


What action should boat operators take to ensure the safety of everyone on the nations waterways?

report suspicious activities


What does pecuiar mean?

assuming you meant peculiar, it means suspicious.


What are the three ways to anonymously report potential hostile intelligence activities?

Submit a report through the FBI's tip line or online portal. Use a whistleblower platform such as SecureDrop to share information anonymously with journalists. Contact a third-party organization like the Anti-Defamation League or Southern Poverty Law Center to report suspicious activities.


Host intrusion detection systems or HIDS are used for what purpose?

HIDS are used to monitor and analyze the internals of a computing system for any suspicious activities or security breaches. They provide real-time monitoring and detection of potential threats, allowing for a quicker response to potential security incidents.


What happened in chapter5 of blood is thicker?

Javon and Hakeem had some problems and Hakeem was getting suspicious about Javon's activities at night


Is it illegal to carry a large amount of cash in Canada?

No but the Police and courts can find this to Be "suspicious" and use it to Begin an investigation into your activities.