"Prevention Through Awareness"
Executive Order
The Oklahoma Counter Terrorism Intelligence Center (OCTIC), Oklahoma's Fusion Center, was first authorized by then-Governor Brad Henry’s Executive Order 2007-41, on October 16, 2007, which directs the Oklahoma Office of Homeland Security and the Oklahoma State Bureau of Investigation to manage the OIFC. The Order was reauthorized by former Governor Mary Fallin in 2011 and by Governor Kevin Stitt on April 12, 2019. The Order was authorized again by Governor Kevin Stitt on March 29, 2023 when it was renamed as OCTIC.
Mission Statement
To protect the residents, visitors, communities, schools, and critical infrastructure in Oklahoma through enhanced counter terrorism, criminal intelligence, investigative, and cyber security support in collaboration with local, state, tribal, federal, and private partners.
Vision
Provide a centralized, comprehensive, multi-agency intelligence clearinghouse to enhance operational effectiveness for all entities and ensure a safe and secure Oklahoma.
Suspicious Activity Reporting Indicators and Examples
This resource provides the 16 ISE-SAR indicators, their respective definitions, and examples of suspicious activity scenarios that correlate with each of the indicators.
Threatening to commit a crime that could harm or kill people or damage a facility, infrastructure, or secured site
EXPRESSED OR IMPLIED THREAT
Stealing or diverting items—such as equipment, uniforms, or badges—that belong to a facility or secured site
THEFT/LOSS/DIVERSION
Prolonged interest in, or taking pictures/videos of, personnel, facilities, security features, or infrastructure in an unusual or covert manner
SURVEILLANCE
Investigating or testing a facility’s security or IT systems to assess the strength or weakness of the target
TESTING OR PROBING SECURITY
Operating or interfering with the operation of an aircraft that poses a threat of harm to people and property
AVIATION ACTIVITY
Unauthorized people trying to enter a restricted area or impersonating authorized personnel
BREACH/ATTEMPTED INTRUSION
Questioning personnel beyond mere curiosity about an event, facility, or operations
ELICITING INFORMATION
Gaining skills or knowledge on a specific topic, such as facility security, military tactics, or flying an aircraft
ACQUISITION OF EXPERTISE
Presenting false information or misusing documents to conceal possible illegal activity
MISREPRESENTATION
Disrupting or compromising an organization’s information technology systems
CYBERATTACK
Funding suspicious or criminal activity or recruiting people to participate in criminal or terrorist activity
RECRUITING, FINANCING
Damaging or destroying part of a facility, infrastructure, or secured site
SABOTAGE, TAMPERING, VANDALISM
Acquisition and/or storage of unusual materials such as cell phones, radio controllers, or toxic materials
MATERIALS ACQUISTION, STORAGE
Collection or discovery of unusual amounts of weapons including explosives, chemicals, or other destructive materials
WEAPONS COLLECTION, STORAGE
Actions that raise concern to specific sectors, (e.g., power plant) with regard to their personnel, facilities, systems, or function
SECTOR-SPECIFIC INCIDENT
If you see something, say something ® REPORT SUSPICIOUS ACTIVITY TO LOCAL AUTHORITIES OR CALL 9-1-1 IN CASE OF EMERGENCY
SEE|SAY
Partners
The Oklahoma Counter Terrorism Intelligence Center (OCTIC) acts as a central information hub for several State, Local, Tribal, and Territorial (SLTT) agencies to share information. Other partners include federal agencies and private sector entities. For additional information on each partner, please click the links below.