Health & Safety

January 9, 2014

Protect your property

355th Fighter Wing 
Security Forces Squadron

What Is Operation Identification?

Operation Identification (Operation ID) is a citizen’s burglary prevention program for use in homes and businesses. The Operation ID program involves marking property with an identifying number as a means of discouraging burglary and theft. It also provides police with a way to identify property should it be stolen and recovered. In communities where it has been properly implemented, Operation ID has shown dramatic results in burglary reduction.

Operation ID Has Two Basic Components

First: Engrave your valuables with your driver’s license number so your property can be easily traced and identified as yours. Please note–If your driver’s license number is your Social Security Number, we strongly recommend you: a) obtain a new license with a new number, or b) obtain an Arizona State Identification Card, which has a generic number and does not expire. Engrave as follows: AZ####### 13 (year of expiration). Engrave in two locations: 1) one that can easily be seen, and 2) one that cannot easily be seen. Photograph or videotape items and keep the photos/tap in a fireproof safe or safety deposit box. Jewelry should be photographed with an ID card and ruler next to it to show ownership and size.

Second: Display a sticker that tells would-be burglars that your property has been marked. Stickers/placards can be purchased at the National Neighborhood Watch Institute’s website by using the following link http://www.nnwi.org/operation_id.asp.

Note: Electric engravers can be purchased at hardware stores, or large department stores in the “tools” section.

What Makes Operation ID So Effective?

Marked property is difficult for a burglar to dispose of–it can be traced to the rightful owner with relative ease. And, if a burglar is caught with marked property, it is solid evidence of possession of stolen goods. After marking your property, make a list of your valuables, and keep a copy of the list in a safe place. If you should become a burglary victim, you will be able to quickly describe the stolen property from the list. This will be of great help to police in their attempts to recover stolen possessions. Once property has been marked and a list made, display the Operation Identification sticker on doors and windows that could be used for entry. By advertising your participation in Operation Identification in this way, you are announcing that your valuable property has been marked and will be difficult for a burglar to sell. Often, the presence of the sticker alone is enough to deter a burglar.

Reporting Crime

If you have information of a crime and would like to provide it annonymously you may contact Security Forces via Crime Stop line at 520-228-4444.

 

Mark These Possessions

 

The items listed below are those most commonly stolen from homes, cars, and businesses:

Answering machines

Bicycles

Binoculars

Camcorders

Cameras

Car audio systems

Computers and equipment

DVD players

Fishing rods, reels

Golf clubs

Guns

Kitchen appliances

Lawn mowers

Mag wheels

Microwaves

MP3 players

Musical instruments

Outboard motors

Radios

Stereo equipment

Tape recorders

Telephones

Tools (hand/power)

Televisions

Vacuum cleaners

Wheel covers




All of this week's top headlines to your email every Friday.


 
 

 
(U.S. Air Force Photo by 2nd Lt. Lacey Roberts)

Arizona Airmen memorialize fallen Iraqi fighter pilot

Members of the Arizona Air National Guard’s 162nd Wing honored the life and memory of Iraqi Air Force Brig. Gen. Rasid Mohammed Sideeq Hasan during a memorial service here July 7. Hasan died June 24 after his F-16 Fighting Fa...
 
 

Deployed A-10s take to the skies

(U.S. Air Force photo by Staff Sgt. Christopher Ruano) An aircraft maintainer assigned to the 354th Expeditionary Fighter Squadron inspects the oil levels of an A-10 Thunderbolt II attack aircraft engine during a theater security package deployment to Lask Air Base, Poland, July 13. The U.S. and Polish air forces will conduct training aimed at...
 
 

Airmen leverage TFI concept

LUKE AIR FORCE BASE, Ariz. – Thirty-eight service members, including individuals from the 944th Civil Engineer Squadron explosive ordnance disposal section, participated in a Battlefield Forensics training course here at the end of June. Together, Senior Master Sgt. Stephen Hunter, 944th Civil Engineer Squadron EOD program manager and Joshua Nason, General Dynamics Information Technology ...
 

 

Celebration and education; Equal Opportunity

  In 1948, Ester Blake became the first enlisted female in the U.S. Air Force, pictures were still black and white, and families gathered around radios for the evening news. Since then, the U.S. Air Force has gone through many changes. The Davis-Monthan Equal Opportunity office specializes in making sure that everyone is treated equally...
 
 
DoD

Final rule puts more teeth into Military Lending Act

  WASHINGTON – The Defense Department today closed loopholes to protect U.S. men and women in uniform from predatory lending practices, President Barack Obama said this morning at the 116th Veterans of Foreign Wars National Convention in Pittsburgh, Pennsylvania. The heightened level of financial and consumer-rights protection against unscrupulous practices, called the final rule of...
 
 

AF continues to work with DOD, OPM on cybersecurity incident

WASHINGTON (AFNS) — The Air Force maintains its commitment to protect personal information from cyber threats by continuing efforts with the Defense Department and the Office of Personnel Management to assist those impacted by the recent cyber incident involving federal background investigation data. OPM and an interagency response team, including investigators from the FBI and...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>