Security is everybody's business

  • Published
  • By Brig. Gen. Susan Helms
  • 45 SW commander
The fence around Patrick AFB is not our only deterrent against criminals and terrorists. Your eyes and ears are also safeguarding our people, our facilities and our operations. Security is everybody's business, not just security forces specialists, Office of Special Investigations agents or contract security guards. 

In our ongoing unconventional war against an elusive, unscrupulous and generally unseen enemy, we must be extra vigilant in watching and listening for suspicious activities. We must keep our collective guard up and stay tuned to our surroundings. 

To help us do that OSI conducts the Eagle Eyes program, which enlists all of us as sentinels in the fight against terrorism and criminal misconduct. Eagle Eyes identifies six primary categories of suspicious behavior you and your family should be familiar with and on the lookout for: 

- Surveillance - someone recording or monitoring activities. This may include the use of cameras (either still or video), note taking, drawing diagrams, annotating on maps or using binoculars or other vision-enhancing devices; 

- Elicitation - people or organizations attempting to gain information about military operations, capabilities, or people. Elicitation attempts may be made by mail, fax, telephone, or in person; 

- Tests of security - any attempts to measure reaction times to security breaches or to penetrate physical security barriers or procedures in order to assess strengths and weaknesses; 

- Acquiring supplies - purchasing or stealing explosives, weapons, ammunition, detonators, timers, etc. Also includes acquiring military uniforms, decals, flight manuals, passes or badges (or the equipment to manufacture such items) or any other controlled items; 

- Suspicious persons out of place - people who don't seem to belong in the workplace, neighborhood, business establishment, or anywhere else; 

- Dry run - putting people into position and moving them around according to their plan without actually committing the terrorist act. This is especially true when planning a kidnapping, but it can also pertain to bombings; and 

- Deploying assets - people and supplies getting into position to commit the act. 

If you notice anything suspicious, please do not hesitate to report it to SFS or OSI. We must work together and actively participate in protecting what we have here at the World's Premier Gateway to Space. Go Sharks!