The Air Force Office of Special Investigations (AFOSI) Detachment 407, Keesler AFB, MS, is a field operating agency, with headquarters at Andrews Air Force Base, Washington, D.C. AFOSI is a federal law enforcement agency and conducts felony level criminal, fraud, counterintelligence, and cyber crime investigations. AFOSI Detachment 407, Keesler AFB, MS, protects and provides services for Air Force and DOD personnel, operations, and resources within 48 surrounding counties in Louisiana, Mississippi, and Alabama. 

To learn more about AFOSI click here to visit the HQ AFOSI main website or copy and paste the following link:

AFOSI Commercial phone number: (228) 377-3420
Organizational email:


If you have information that you would like to share (which can be done anonymously) with AFOSI, please contact an agent at (228) 377-3420 or DSN 597-3420, you can also call 81st Security Forces Squadron at (228) 377-3040 or DSN 866-3040. "You may make the difference in countering terrorism" Only you know who or what belongs - or doesn't belong - in your neighborhood and workplace. Recognition of this fact is the catalyst behind one of the Air Force's latest antiterrorism initiatives. This initiative is known as the "Eagle Eyes" Program.

The "Eagle Eyes" program has characteristics of a typical neighborhood watch program and many officials consider it a key piece in the Air Force's antiterrorism strategy. Anyone in the Keesler AFB community with information to report should immediately call the 81st Security Forces Squadron (SFS) Law Enforcement Desk Sergeant at (228) 377-3040. 81st SFS will respond as appropriate to the immediate situation and pass the report to AFOSI. 

The information is shared with additional Air Force units and the Army, Navy, and other federal agencies. The key to this program is public awareness. Most terrorist activities are thwarted when people recognize and report unusual activity. Anyone from active duty personnel to a family member, or even an off-base business proprietor, could see something out of the ordinary, report it, and make the difference between a terrorist act occurring or not occurring. Our best chance to detect and prevent a terrorist act in our community is to vigilantly report suspicious activity. 

Suspicious activity that should be reported can be classified into six broad categories: 

1.  Specific threats:  Any threat received by any means that contains a specific time, location, or area for an attack.
2.  Instances of any out-of-the-ordinary person or persons monitoring activities and/or recording information. Such activity may include the use of cameras, note taking, notes on maps or drawings, hand-drawn maps or diagrams, and the use of binoculars or other vision-enhancing devices. It could also be as simple as seeing the same unknown vehicle parked in your area without explanation. 

3.  Any attempts to obtain security-related information, or even basic information about the base, by anyone who does not have the appropriate security clearance and the need-to-know. Known as "elicitation", these attempts may be made by e-mail, fax, telephone, in person, or through the mail. 

4.  Any attempts to measure security reaction times or strengths and weaknesses; any attempts to test or to penetrate physical security barriers or procedures; any attempts to acquire or duplicate uniforms, badges, passes, or other security-related documents.

5.  Repetitive activities: Any two or more suspicious activities by the same person and/or vehicle in a one-month period.

6.  Suspicious activities/incidents: Any activity that does not specifically fit into the previous categories yet it is a concern to you. Some examples of this are thefts of uniforms, ID cards, or vehicle decals from your vehicle, home, or office. 

Remember, your vigilance can help thwart the next terrorist attack. To report any one of the six suspicious activities listed above, call 81st Security Forces Squadron at (228) 377-3040. 
Your e-mail will be used only so the Keesler Webmaster may provide for you the information you request. E-mails will be destroyed after the information you request is forwarded back to you.

This page last updated: 10/24/2022