Eagle Eyes
Program offers added measures against terrorism

Special Agent Seth Flinchbaugh
Air Force Office of Special Investigations

Since the events of Sept. 11, 2001, the Air Force Office of Special Investigations enacted the neighborhood watch program, Eagles Eyes, which is designed to assist in preventing terrorist attacks.
There are thousands of eyes and ears here in the KMC and not many things can occur without someone observing it.
Everyone has at one time or another noticed someone or something that just did not seem to fit the situation or the location. Most of us simply go on with our day and forget about whatever it was we observed, but in today’s environment we no longer have that luxury and the information must be reported.
In the past, there were many places someone could report suspicious incidents and the information may or may not have gone where it was needed. Many people who did report incidents never heard anything about it again and were unaware if anything had actually been done with the information they provided making the information seem unimportant.
Eagle Eyes helps solve this problem by making sure all information is disseminated to the responsible agencies and follow-up is conducted as appropriate. Once the follow-up is conducted, the results are reported timely and accurately.
As a result of this program, the Air Force is able to identify and investigate various suspicious incidents and find connections.
Eagle Eyes not only allows OSI and security forces to react to and investigate reported incidents, they are then able to identify security weaknesses and implement corrective measures.
Some of the most common examples of suspicious activities related to terrorist and foreign intelligence service activities are:
n Surveillance – someone recording or monitoring activities. This may include the use of cameras, camcorders, note taking, drawing diagrams, annotating on maps or using binoculars.
n Elicitation – people or organizations attempting to gain information about military operations, capabilities or people. Elicitation attempts may be made by mail, e-mail, fax, telephone or in person.
n Acquiring supplies – purchasing or stealing explosives, weapons, ammunition, etc. Also, acquiring military uniforms, passports, decals, flight manuals, passes or badges (or the equipment to make such items) or any other controlled items.
n Suspicious persons – people who do not seem to belong in the workplace, neighborhood, business establishment or anywhere else.
n Dry run – putting people into position and moving them around according to their plan without actually committing the terrorist act.
n Deploying assets – people and supplies getting into position to commit the act. This is a person’s last chance to alert authorities before the terrorist act occurs.
Report any of these activities or anything of a suspicious nature to law enforcement. For more information call, the 568th Security Forces Squadron law enforcement desk at 480-2050.