top of page


Unified SRM promotes not only service to country, but support of community.  We are here to help business at all levels be prepared for unexpected circumstances, engage with private and public sector partners, and if needed reach out for help should something go wrong.

Through unified efforts between federal, state, local, tribal, territorial, and private organizations, our homeland can be a safer place.  Organizations can access the below resources to learn about and enhance security aspects pertaining to the following security disciplines.

  • Physical Security

  • Cyber Security (including computer security, IT security & information assurance, Network Security, end-point security, cloud security....)

  • Operational Security

  • Personnel Security

  • Information Security

  • Communications Security

  • Emanations Security

  • Industrial Security

  • Special Security

Industry & Product Service Codes

Unified SRM North American Industry Classification System Code(s):

541512: Computer Systems Design Services

541519: Other Computer Related Services

Unified SRM Product Service Code(s):

D310: IT and Telecom - Cyber Security and Data Backup

L063: Technical Representative - Alarm, Signal, and Security Detection Systems

R413: Support - Professional; Specifications Development

R499: Support - Professional; Other

U099: Education / Training; Other

Unified SRM Commercial & Government Entity(CAGE) Code: 7FQS9

Unified SRM DUNS: 079949420


Notice: Individuals with knowledge of situations involving possible danger to life or property are strongly urged to Call 911 without delay, the emergency dispatchers will assist in determining the urgency of the situation.

Reporting is handled differently by different organizations, below is are general guidelines for reporting; reporting of suspicious activity is usually done using specific procedures, in a specific format and most importantly in a specific time frame .  Refer to internal policies and procedures, and if non exist consult your organization's management for next steps prior to releasing any information to an outside organization. 


Small and medium-sized companies usually don't have policies and procedures in place to process suspicious circumstances, and are generally handled as they occur by management.  If there are no policies or procedures, and management is supportive, the below reporting systems are available.


If unclear what law enforcement agencies are generally interested in please review this suspicious activity list.

State, Local & Tribal: These organizations will have internal policies and procedures, and should refer to both them and management.


Private Industry whom are National Industrial Security Program (NISP) members: NISP members have either contractual, regulatory or even legal requirements on how, who and when to report; they should refer to internal policies, procedures and management.

Private Industry: Refer to internal policies, procedures and management; should management be supportive, the below reporting systems are available.

  1. Wisconsin Statewide Intelligence Center (WSIC) General Suspicious Activity Report (Anything Activities Not Cyber Related)

  2. Wisconsin Statewide Intelligence Center (WSIC) Cyber Suspicious Activity Report System (Only Cyber Related Activities)

  3. FBI Online Tips and Public Leads Reporting System (Anything which seems criminal or terrorism in nature, which is not cyber Related.)

  4. FBI Internet Crime Complaint Center Reporting System (Only Cyber Related Activities)

  5. DHS, CISA Non-Emergent & Non-Sensitive Cyber Incident & Vulnerability Report


Being prepared and reporting will get you most of the way there, engagement with other's brings context to vulnerabilities, awareness of exposure and insight on threats and how they can be dynamic.  Organizations are better served assigning individual(s) to engage with security groups and organizations, which hold regular local meetings and activities to support security, promote its growth and most importantly get access to information regarding threats and vulnerabilities reported by others.

  1. WI DoJ, Wisconsin Crime Alert Network

  2. FBI, InfraGard, Wisconsin Chapter

  3. Society of Industrial Security Professionals, Wisconsin Chapter

  4. Multi-State Information Sharing and Analysis Center

  5. Information Systems Security Association International

  6. UW Madison, OCIS, Annual Lockdown Conference

  7. WI Homeland Security Council Monthly Meeting


  1. DHS, Cyber Security and Infrastructure Security Agency (CISA) Connect, Plan, Train, Report Hometown Security Campaign: A framework to develop a program to proactively manage incidents and attacks which affect the safety and security of state, local, tribal, territorial or private organizations.

  2.  DHS Securing Soft Targets and Crowded Places Hometown Security Campaign: Sadly, these types of situations are occurring more frequently, affecting the general sense of safety and security of state, local, tribal, territorial or private organizations.  This framework will help organizations create a program designed to reduce risk to both individual and crowds which might be exposed to entities with malicious intent, which can change over various periods of time (Dynamic Threat).

  3. DHS, National SAR Initiative, Online Private Sector Security Training

  4. DHS, National SAR Initiative, Online Public Awareness Training

bottom of page