What are common examples of suspicious activity?

Asked by: Prof. Odell Kerluke  |  Last update: March 11, 2026
Score: 4.7/5 (68 votes)

Common examples of suspicious activity include unusual surveillance (taking photos of security, loitering), testing security (trying doors, asking odd questions), unusual behavior (inappropriate dress, erratic pacing, abandoning packages), and financial red flags (large cash transactions, structured deposits). It's activity that seems out of place, lacks a legitimate purpose, or could signal preparation for a crime, terrorism, or fraud.

What are some examples of suspicious activity?

Suspicious behavior or activity can be any action that is out of place and does not fit into the usual day-to-day activity of our campus community. For example, someone looks into multiple vehicles or homes or tests to see if they are unlocked.

What counts as suspicious activity?

Suspicious activity is any behavior or situation that seems unusual, out of place, or potentially harmful, indicating possible criminal planning like terrorism, fraud, or theft, but it's crucial to focus on actions, not appearance. Examples include unusual surveillance (photography, asking probing questions), testing security, stockpiling supplies, unattended packages, or vehicles lingering in odd locations, but it's up to law enforcement to determine if it warrants action. 

Which of the following would be considered suspicious activity?

A person behaves strangely or exhibits unusual movements. A person concealing an object or carrying a weapon. A person looking into cars, moving from car to car, and/or tries door handle.

How are suspicious activity reports most commonly made?

Suspicious Activity Reports should be submitted using the SAR Portal. The SAR Portal is the most secure and efficient way to submit a SAR. You will receive an acknowledgement and reference number following submission, and reports can be made 24/7.

What Are Common Examples Of Suspicious Activity? - SecurityFirstCorp.com

29 related questions found

What is the red flag of suspicious activity?

In Anti-Money Laundering (AML), a 'red flag' is a term used to denote a warning sign that suggests potential criminal activity, such as money laundering. It's a signal that alerts both businesses and law enforcement agencies to transactions that may be suspicious.

What all can be included under suspicious activities?

Suspicious activity is any behavior or situation that seems unusual, out of place, or potentially harmful, indicating possible criminal planning like terrorism, fraud, or theft, but it's crucial to focus on actions, not appearance. Examples include unusual surveillance (photography, asking probing questions), testing security, stockpiling supplies, unattended packages, or vehicles lingering in odd locations, but it's up to law enforcement to determine if it warrants action. 

What triggers a suspicious activity report?

If a customer does something obviously criminal – such as offering a bribe or even admitting to a crime – the law requires you to file a SAR if it involves or aggregates funds or other assets of $2,000 or more.

What is an example of a suspicious item?

A suspicious item is anything (e.g., bag, package, vehicle, etc.) that is reasonably believed to contain explosives, an Improvised Explosive Device (IED), or other hazardous material that requires a bomb technician and/or specialized equipment to further evaluate it.

What do banks flag as suspicious activity?

9 Common Examples of Financial & Bank Suspicious Activities

  • Money Laundering. ...
  • Cash Transaction Structuring. ...
  • Check Fraud. ...
  • Check Kiting. ...
  • Wire Transfer Fraud. ...
  • Mortgage and Consumer Loan Fraud. ...
  • Misuse of Position (Self-Dealing) ...
  • Identity Theft or Fraud.

How do police define suspicious activity?

What is Suspicious Activity? Suspicious activity is any observed behavior that may indicate pre-operational planning associated with terrorism or terrorism-related crime.

What evidence is needed for reasonable suspicion?

Evidence for reasonable suspicion requires specific, articulable facts (observations of behavior, appearance, speech, or odors) that, combined with training and experience, lead an officer to believe criminal activity is occurring, is about to occur, or has occurred, exceeding a mere hunch but less than probable cause. This could involve things like slurred speech, erratic movements, or the smell of alcohol, justifying a brief investigatory stop (a Terry stop). 

What triggers Google suspicious activity?

Each time there's an action that diverges from your usual account activity, Google steps in and sounds the alarm. Common triggers include logins from new or unrecognized devices, attempts to access your account from unusual locations, suspicious credential use, or modifications made to your security settings.

What are the 4 types of transactions?

The four fundamental types of business financial transactions are Sales, Purchases, Receipts, and Payments, representing money coming in or going out for goods/services, which impact a company's assets, liabilities, and equity. Sales involve transferring goods for money/credit; purchases acquire needed items; receipts are when money is received; and payments are when money is issued. 

Does depositing cash look suspicious?

Smaller Deposits Can Still Trigger Scrutiny

Even deposits under $10,000 can lead to issues if they appear to follow a pattern meant to avoid reporting. In those cases, a bank may file a Suspicious Activity Report (SAR). These reports are confidential, and you won't be notified if one is filed.

Which of the following is an example of a suspicious person?

The following are some examples of behaviors that could be considered suspicious: Persons monitoring areas, entrances to buildings or buildings. Persons pacing back and forth who appear to be dazed or confused. A person pulling on multiple doorknobs or trying to open residence hall/office rooms.

What is considered suspicious activity?

Suspicious activity is any behavior or situation that seems unusual, out of place, or potentially harmful, indicating possible criminal planning like terrorism, fraud, or theft, but it's crucial to focus on actions, not appearance. Examples include unusual surveillance (photography, asking probing questions), testing security, stockpiling supplies, unattended packages, or vehicles lingering in odd locations, but it's up to law enforcement to determine if it warrants action. 

What is a list of suspicious things about?

The List of Suspicious Things (Paperback) Engrossing and heartwarming in equal measure, The List of Suspicious Things follows best friends Miv and Sharon in the Yorkshire Ripper-era North, as they embark on solving the mystery of the disappearing women only to find unanswered questions much closer to home.

What are the four C's for suspicious items?

If you believe that an item is suspicious, the “4Cs” protocol should be applied - CONFIRM, CLEAR, COMMUNICATE and CONTROL. Is it HIDDEN? Has the item been deliberately concealed or is it obviously hidden from view?

How to detect suspicious activity?

Your Gmail activity might be suspicious if:

  1. You no longer receive emails.
  2. Your friends say they got spam or unusual emails from you.
  3. Your username has been changed.
  4. Your emails were deleted from your inbox and aren't found in "Trash". ...
  5. You find "Sent Emails" that you didn't write.

What are the three types of frauds?

Three common categories of fraud, especially in corporate settings, are asset misappropriation, bribery and corruption, and financial statement fraud, but other classifications include types like identity theft, first-party fraud, and investment fraud, depending on the focus (e.g., perpetrator, victim, or method).
 

Which of the following are examples of suspicious activity?

The following are examples of some common suspicious activities: Unusual customer identification or information, including false identifications; two or more customers using similar identifications; altering transactions upon learning they must show identification; and altered spelling or order of the full name.

What counts as suspicious behaviour?

Examples of suspicious activity might include: Someone who you may consider to be a trespasser. Scoping out addresses. Conducting occupancy checks prior to a burglary.

What are the five types of frauds in online transactions?

Let's examine some of the most common types of eCommerce fraud.

  • Credit Card Fraud. ...
  • Identity Theft. ...
  • Chargeback Fraud. ...
  • Account Takeover Fraud. ...
  • Phishing and Social Engineering. ...
  • Triangulation Fraud. ...
  • Refund Fraud. ...
  • Clean Fraud.

What is an example of an unusual activity?

Unusual activity refers to customer behavior or transactions that deviate from established patterns and may indicate money laundering or fraud. Examples include sudden large transfers, transactions inconsistent with a customer's profile, or dealings with high-risk jurisdictions.