Eagle Eyes Program: being aware of the world around you

  • Published
The Eagle Eyes program is an example the importance of details. Eagle Eyes was developed after September 11, 2001, as a way to make Air Force members more aware of what's going on around them. That includes what happens in the off base communities in which they may live.

Eagle Eyes information lists seven types ofsuspicious behavior for which people can be on the lookout, and gives information about how to report it.

Office of special investigations agents augment the program by making regular contact with community agencies and civilian authorities on the city, county, state and federal levels. Everyday actions that nobody thinks much about, like bringing uniforms to a local laundry, may provide valuable information about pre-operational activities by terrorists.

If you observe any suspicious activities at any time of the day or night, call 877-246-
1453. You may do so anonymously. You may also send information using the "Crimebusters" link.

Categories of Suspicious Activities

Surveillance

Someone recording or monitoring activities. This may include the use of cameras (either still or video), note taking, drawing diagrams, annotating on maps, or using binoculars or other vision-enhancing devices.

Elicitation

People or organizations attempting to gain information about military operations, capabilities, or people. Elicitation attempts may be made by mail, fax, telephone, or in person. Examples could include being approached at a gas station (or mall or airport or library, etc) and asked about what's happening at the base; getting a fax (or an e-mail or a telephone call, etc) asking for troop strength numbers, etc.

Tests of security

Any attempts to measure reaction times to security breaches or to penetrate physical security barriers or procedures in order to assess strengths and weaknesses. Examples: a person grabs the base fence and shakes it and sees how long it takes for police to respond; a driver approaches the front gate (without identification) and pretends to be lost or to have taken a wrong term, just to learn the procedures of how he is dealt with and how far into the gate he can get before being turned around.

Acquiring supplies

Purchasing or stealing explosives, weapons, ammunition, etc. Also includes acquiring military uniforms, decals, flight manuals, passes or badges (or the equipment to manufacture such items) or any other controlled items

Suspicious persons out of place

People who don't seem to belong in the workplace, neighborhood, business establishment, or anywhere else. Includes suspicious border crossings and stowaways aboard ship or people jumping ship in port. This category is hard to define, but the point is that people know what looks right and what doesn't look right in their neighborhoods, office spaces, commutes, etc., and if a person just doesn't seem like he or she belongs, there's probably a reason for that.

Dry run

Putting people into position and moving them around according to their plan without actually committing the terrorist act. This is especially true when planning a kidnapping, but it can also pertain to bombings. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow. Take note of people moving around from place to place without any apparent purpose and doing it, perhaps, many times.

Deploying assets: people and supplies getting into position to commit the act.

This is a person's last chance to alert authorities before the terrorist act occurs. Look for people loading up vehicles with weaponry/ explosives, etc, and/or parking that vehicle somewhere, or people in military uniforms (who don't look right) approaching an installation or getting into a vehicle, or people who seem out of place standing by at a certain location as if waiting for something to happen.