DoD

September 7, 2012

Prevent terrorism

412th TW Aniterrorism Office

As we approach another anniversary of the terror attacks on 9/11, we are reminded of the importance of situational awareness and the need to report suspicious activity to local law enforcement offices and our base security forces.

Much has changed since Sept. 11, 2001, to increase our nation’s security but the threat of a terrorist organization causing harm to the United States has remained a constant.

We must continue to do our part and report activities that are suspicious in nature as soon as we recognize them. The Air Force Eagle Eyes program has identified the following seven areas in which it is imperative to identify and report suspicious activity to help prevent a terrorist attack.

Surveillance: Someone recording or monitoring activities. This may include the use of cameras (either still or video), note taking, drawing diagrams, annotating on maps or using binoculars or other vision-enhancing devices.

Elicitation: People or organizations attempting to gain information about military operations, capabilities, or people. Elicitation attempts may be made by mail, fax, telephone, or in person. Examples could include being approached at a gas station (or mall or airport or library, etc.) and asked about what’s happening at the base.
Getting a fax (or an e-mail or a telephone call) asking for troop strength numbers; the number of airplanes on base; deployment procedures; or how a trash-collection truck gets on base. They could also ask the location of the HQ building; how many people live in a dorm; where the commander lives; how many people hang out at the club; which nightclubs/restaurants off base are highly frequented by military; or the workings of the base’s network firewall, etc.

Tests of security: These are attempts to measure reaction times to security breaches or to penetrate physical security barriers or procedures in order to assess strengths and weaknesses. Examples: A person grabs the base fence and shakes it to see how long it takes for police to respond; a driver approaches the front gate (without ID and/or car sticker) and pretends to be lost or have taken a wrong term just to learn the procedures of how they are dealt with and how far into the gate he/she can get before being turned around. Another example is a person places a “smoke bomb” near the fence or throws it over the fence to learn how quickly police respond and what effect that has on front-gate operations, etc.

Acquiring supplies: Purchasing or stealing explosives, weapons, ammunition, detonators, timers, etc. Also includes acquiring military uniforms, decals, flight manuals, passes and badges (or the equipment to make such items), or any other controlled items.

Suspicious persons out of place: People who don’t seem to belong in the workplace, neighborhood, business establishment or anywhere else. This can include suspicious border crossings and stowaways aboard ship or people jumping ship in port. This category is hard to define, but the point is that people know what looks right and what doesn’t look right in their neighborhoods, office spaces, commutes, etc., If a person doesn’t seem like he or she belongs, there’s probably a reason for that.

Dry run: Putting people into position and moving them around according to their plan without actually committing the terrorist act. This is especially true when planning a kidnapping, but it can also pertain to bombings. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow. Take note of people moving around from place to place without any apparent purpose and doing it, perhaps, many times. The appropriate example here is the Sept. 11 hijackers who are now known to have actually flown on those exact flights several times before Sept. 11. Their purpose was to practice getting their people into position, working out arrival times, parking, ticketing, going through security, boarding, etc. By taking note of everything around them, in one sense they were conducting surveillance and testing security, but they were also doing a dry run of the actual activity.

Deploying assets: People and supplies getting into position to commit the act. This is a person’s last chance to alert authorities before the terrorist act occurs. Look for people loading up vehicles with weaponry/explosives and/or parking that vehicle somewhere. People in military uniforms (who don’t look right) approaching an installation or getting into a vehicle; people who seem out of place standing by at a certain location as if waiting for something to happen. One fairly good example of this is the attack on the Khobar Towers in Saudi Arabia. When the explosives-laden truck pulled up to the fence line (which was the “deploying assets” step) the driver jumped out and ran away. That was seen by a spotter on the roof of the dormitory who recognized this as suspicious activity. He then sprinted down stairs and began pounding on doors, rousting people out of bed and getting them out of the building. Because of that, he saved many, many lives. It’s all because he recognized the “deploying assets” element.




All of this week's top headlines to your email every Friday.


 
 

 
DoD
STOVL1

STOVL testing at Edwards

A Short Takeoff and Vertical Landing variant of the F-35 Lightning II is shown performing Crosswind and Wet Runway testing at Edwards AFB May 6. Pilot Dan Levin and a team from the F-35 Integrated Test Facility at Patuxent Rive...
 
 
DoD

Tax tips for military personnel

The tax season is well underway and, so far the Edwards Tax Center has processed more than 200 returns and gotten our Edwards members more than $450,000 in refunds. If you have not yet filed your taxes, and would like to use our free tax filing services, please call the Edwards Legal Office at (661)...
 
 
DoD

2014 QDR presumes future includes more risk, less money

The 2014 Quadrennial Defense Review isn’t like previous reviews, a senior Defense Department official said March 10. Christine E. Wormuth, deputy undersecretary of defense for strategy, plans and force development spoke at the Center for Strategic and International Studies. The QDR is a congressionally mandated review of DOD strategy and priorities. It is intended to...
 

 
DoD

DOD to mandate documentation for lost, stolen CAC cards

Later this year, the Defense Department will begin fully enforcing a previously optional policy regarding the reissuance of lost or stolen common access cards, a defense official said in Washington, D.C., Feb. 11. Sam Yousef, a program manager for identity and benefits policy at the Defense Human Resources Activity, discussed an update to the current...
 
 
DoD

DOD electronic health records help VA disability claims

WASHINGTON – The Defense Department has made troops’ health records electronically available to the Veterans Affairs Department to speed up the adjudication of disability claims, a DOD health information technology official said. Now in place for service members who have separated or discharged from the military since Jan. 1, the Health Artifact and Image Management...
 
 
DoD

DOD releases new religious accommodation instruction

The Defense Department released a new instruction Jan. 22 that details its updated policy on making religious accommodations requested by service members, Pentagon spokesman Navy Lt. Cmdr. Nathan J. Christensen said. A DOD instruction implements a policy or prescribes the manner or plan of action used to carry out a policy, operate a program or...
 




One Comment


  1. [...] Desert Wings 1 min ago by in Edwards AFB. You can follow any responses to this entry through the | RSS feed. You can leave a response, or trackback from your own site. [...]



Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>