Counterterrorism: Violent Extremism Mobilization Indicators
The US Violent Extremism Mobilization Indicators, 2025 Edition is a PDF pamphlet published by the National Counterterrorism Center (NCTC), Federal Bureau of Investigation (FBI), and Department of Homeland Security (DHS) to inform law enforcement, terrorism prevention practitioners, other first responders, community leaders, as well as the general public about both threats of violence and contextual behaviors that suggest an individual is mobilizing to violence.
[ Read SemperVerus articles on the topic of THREAT ANALYSIS ]
This is a helpful situational awareness resource for church security teams and self-defenders in general for identifying discernible pre-indicator signs of criminal and terrorist aggression.
[ Bookmark the SemperVerus CHURCH SECURITY INTELLIGENCE CLIPBOARD ]
While some violent extremists may make direct, indirect, or vague threats of violence, others may plot violent action while avoiding such overt threats to maintain operational security—underscoring the need to consider both threats of violence and contextual behaviors.
[ Read SemperVerus articles on the topic of SITUATIONAL AWARENESS ]
The indicators of violent extremist mobilization described in this booklet are observable behaviors that could help to determine whether individuals are preparing to engage in violent extremist activities.
[ Read the SemperVerus article, WHCA Dinner Shooter: Is Your Situational Awareness Keen Enough? ]
The indicators are grouped in reverse chronological order according to the behavior stages individuals undergo: mobilization to violence, engaging in preparation, and developing motivation. These indicators suggest how close an individual may be to mobilizing to violence and are ordered by the strength of the indicator within each category.
[ Read the SemperVerus article, Prepare for Teams of Terrorists, Says Gabe Suarez ]
Pre-Indicator Threat Tactics to Watch For
⇨ Conducting a dry run of an attack or assault or attempting to get near or access identified targets.
[ Read the SemperVerus article, Checklist: Terrorist Preoperational Surveillance Tactics ]
⇨ Unusual interest in researching, building, or testing explosives, especially if tailored to a specific target; unusual injuries.
[ Read the SemperVerus article, Preparation Warnings from Former CIA Analyst, Sarah Adams ]
⇨ Unusual purchase of military- or law enforcement–style tactical equipment, such as body armor or personal protective equipment, in a manner that raises suspicion of planning violence.
[ Read the SemperVerus article, Terrorists Call for Attacks on Christians ]
⇨ Surveilling potential attack targets.
[ Read the SemperVerus article, A List of Active Killer Incidents at Houses of Worship and Religious Schools ]
⇨ Increased use of physical concealment tactics (for example, countersurveillance techniques or disposable phone) in support of planning a specific act of violence.
[ Read the SemperVerus article, Counterterrorism Guide: Situational Awareness to Hinder An Attack ]
⇨ Increased use of online concealment tactics (such as deleting, hiding, or manipulating social media or other online accounts to misrepresent location or hide group membership, contacts, or activities) in support of planning a specific act of violence.
[ Read the SemperVerus article, Chart: The Spectrum of Potential Threat Personas in Self-Defense and Church Security ]
⇨ Unusual efforts to obtain explosives precursors, especially illegally or surreptitiously.
[ Read the SemperVerus article, Free Threat Intelligence for Your Church Security Team ]
⇨ Acquisition of weapons or ammunition for suspected criminal purposes.
[ Read the SemperVerus article, “Most Terrorists Are Terrifyingly Normal,” Says Former Intelligence Officer ]
⇨ Change in or initiation of physical or weapons training, for suspected criminal purposes.
[ Read the SemperVerus article, Discreet Body Armor for Self-Defense and Church Security ]
⇨ Conducting research related to target or tactic selection for violent acts (for example, seeking blueprints, maps, schematics, or technical specifications).
[ Read the SemperVerus article, Checklist: Questions to Ask During a Bomb Threat Call ]
⇨ Pursuing or exploiting jobs or personnel who provide sensitive access to enable violent acts (in sectors such as critical infrastructure, the Intelligence Community, law enforcement, or the military).
[ Read the SemperVerus article, Enroll in the Sheepdog Church Security Academy Safety Member Certification Program ]
⇨ Seeking technical expertise (for example, in aviation, biology, chemistry, or electronics) to enable planning violence.
[ Read the SemperVerus article, Interview With Police Trainer, Ron Borsch, on Church Security Teams Stopping Active Killer Incidents ]
Also see the NSI Suspicious Activity Reporting Indicators and Behaviors PDF checklist.
[ Read the SemperVerus article, A Prayer for Church Security Team Members ]

Invite SemperVerus® to present its 5 life-changing success-generating components—prepare, aware, be, know, do—to your organization to inspire and motivate your members.
Join the SemperVerus Brotherhood™!
Discover more from SemperVerus
Subscribe to get the latest posts sent to your email.
