Vigilance key to force protection success

  • Published
  • By Master Sgt. D.R. Hansford
  • 16th SOW Force Protection
We can never let our guard down when it comes to force protection.

The keys in this never-ending awareness campaign are reporting possible surveillance activity, elicitation, tests of security, suspicious persons, and deploying personnel and assets.

Everyone in this wing and command has the responsibility to keep the mission on track and in doing so, must protect our most vital assets - the people.

Without protecting our personnel, special operations assets and key resources end up being affected and ultimately the mission is degraded.

The following are giveaways that our adversaries are up to something. Anyone who witnesses or is aware of these activities must report what they know to the proper authorities in order to protect lives, property and vital military assets.

Surveillance activity - Someone recording or monitoring base activities. This may include the use of cameras, either still or video, note taking, drawing diagrams, annotating on maps, or using binoculars or other vision-enhancing devices.

Elicitation - People or organizations attempting to gain information about military operations, capabilities or people. Elicitation attempts may be made by mail, fax, telephone or in person.

Tests of security - Any attempts to measure reaction times to security breaches or to penetrate physical security barriers or procedures in order to assess strengths and weaknesses.

Suspicious persons - Persons who appear out of place; people who don't seem to belong in the workplace, neighborhood or business establishments. This includes suspicious behavior around the base perimeter, fence lines, overpasses or entry control points.

Deploying personnel and assets - People and supplies moving into position to commit the act. This is a person's last chance to alert authorities before the terrorist act occurs.
For more information, call 884-6208 or 884-3235.