Force protection a cooperative effort

Recent terrorism arrests by German authorities underscore the importance of prudent force protection measures. U.S. Air Forces in Europe Airmen and families are urged to make force protection a part of their daily lives – at work and at home, while on base, or when traveling.

“All are encouraged to practice increased security awareness during periods of heightened force protection. It’s everyone’s job to ensure we protect our family members and ourselves,” said Col. Lyle Cary, deputy chief of security forces for USAFE.

 Ramstein Air Base is taking prudent measures to ensure the security and safety of our Airmen, civilians, their families and our resources, said Col. Earl Matthews, 435th Air Base Wing commander.

“We are firmly committed to maintaining a robust security posture tailored to the threat assessment,” said Colonel Matthews. “We also empower everyone to report suspicious activity via our Eagle Eyes program by calling 480-2050.”

These measures may include force protection changes, said Colonel Cary.  The Department of Defense, as a matter of policy, does not discuss specifics of how the force protection condition is determined.

“Force protection is a cooperative effort with many agencies involved.  Ramstein, USAFE, and EUCOM officials work hand-in-hand with our partners in German law enforcement and the German government,” said Colonel Cary.

According to the Air Force Eagle Eyes program, Airmen and families are crucial to the force protection effort. 

No matter how well trained and vigilant, law enforcement officials simply cannot be everywhere.  Your eyes and ears − and those of your friends and family − can be of enormous help in preventing terrorism. If you observe any suspicious activities at any time during the day or night, contact the Ramstein Law Enforcement desk at 480-2050.

(Courtesy of USAFE public affairs)

The U.S. Air Force Eagle Eyes program reminds you to keep an Eagle Eye out for these suspicious behaviors:
· Surveillance  Someone recording or monitoring activities including the use of cameras (both still and video), note taking, drawing diagrams, writing on maps, or using binoculars.

 · Elicitation  Anyone or any organization attempting to gain information by mail, fax, telephone, or in person about military operations or people.

 · Tests of security Any attempts to measure reaction times to security breaches or to penetrate physical security barriers or procedures.

· Acquiring supplies  Purchasing or stealing explosives, weapons, ammunition, uniforms, decals, flight manuals, passes or badges (or the equipment to manufacture them), or any other controlled items.

· Suspicious persons out of place People who don’t seem to belong in the workplace, neighborhood, business establishment, or anywhere else.  This also includes suspicious border crossings or stowaways.

· Dry run  Putting people into position and moving them about without actually committing a terrorist act such as a kidnapping or bombing.  An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow.

 · Deploying assets  People and supplies getting into position to commit the act.  This is the last opportunity to alert authorities before the terrorism occurs.