Air Force Gears Up With Eagle Eyes Published May 13, 2009 By Headquarters, Air Force Office of Special Investigation PA CANNON AIR FORCE BASE, N.M. -- With the build-up of Air Force Special Operations Command here, Air Force Office of Special Investigations Detachment 120 is trying to get the word out about its Air Force-wide program intended to deter terrorism by recognizing and reporting pre-attack activities. The program, known as Eagle Eyes, is a global neighborhood watch program created to promote an aware and involved community. The program encourages those both on and off base to be cognizant of the observable planning activities of an attack and to report them. The Eagle Eyes program ensures that the community knows what to look for and how to report suspicious activity; with a well-informed community, terrorist acts can be prevented or at least mitigated. The first important element to be aware of is surveillance. Overt surveillance may involve a person standing outside the gate jotting down notes or drawing a rough map, taking pictures, or using binoculars or other vision-enhancing devices. However, some surveillance is more covert, such as a "broken down" car in a place that allows its occupants the ability to observe on base activities while waiting for "help." To plan an attack terrorists must acquire information about the base and its personnel. In the early stages this can be done by reading published information or searching the Internet, but at some point the terrorists will try to obtain undisclosed information; this is usually done through elicitation, which is the attempt to obtain security-related information without the proper clearance or need to know. Elicitation may occur by phone, fax, e-mail, snail mail, or in person. A terrorist may call and pose as an Air Force member, asking to speak to a high-ranking Air Force official to find out if he/she is deployed or away from base. A stranger may approach an Air Force member in uniform at an off base restaurant and, feigning curiosity, strike up a conversation: "Oh you work at Cannon. What do you do? ... How many people from your office are deployed? ...What kind of planes do you have on base, etc?" Although these questions may seem harmless, this is how terrorists gather the insider information necessary to carry out their plan. If people suspect that someone is trying to elicit information from them, they should not reveal anything and should contact their supervisor or the 27th Special Operations Security Forces Squadron Law Enforcement DeskĀ at 784-4111. The third stage of planning a terrorist attack involves tests of security. This occurs when the terrorists attempt to measure the base's security reaction time and to assess its strengths or weaknesses. This may include someone driving at a high speed toward the gate to gauge the guards' reactions or it may involve a person hopping the fence and seeing how long he/she can elude the guards. At this stage, terrorists are interested in finding out the capability of the security they are up against, and how much they can get away with. Terrorists must also collect the necessary tools to carry out their mission. This may include purchasing or stealing weapons, ammunition, uniforms, military ID cards, or any other controlled items. Dry cleaners often call saying they have ID cards that were left in clothes; though this seems harmless, this could provide terrorists access to the base so it is important for on base personnel to keep track of their ID cards and other controlled items. In addition, it is important to take note of suspicious people who "don't belong." After working in an office for a few weeks, people typically know who belongs in the office for the most part, so they should not be afraid to ask to see an ID or orders if there is a strange, inquiring face. Or, if they prefer not to take a direct approach, they can contact Security Forces and they will sort out the matter. The very last step before a terrorist attack is the dry run. This is the test run, when the terrorists rehearse their plan, map out routes, and determine the timing and flow of their attack. After the rehearsal, the terrorists deploy their assets and get into position. At this point, they are putting on their masks and readying themselves to carry out their mission. This is the last opportunity to catch the terrorists before the attack occurs, so it is crucial to alert authorities immediately. The Eagle Eyes program works to enlist the help of the community in preventing terrorism. Law enforcement officers cannot be everywhere, so they need the eyes and ears of the entire community -- active duty, guard and reserve, military family members, civilian employees, defense contractors, merchants, neighborhoods, churches, schools, and civic groups. The community's assistance is critical in protecting the base, the community, and the country. If Airmen or citizens see anything out of the norm or anything suspicious on or off base, they should report it immediately to the 27 SOSFS/LED, available 24 hours a day at 784-4111.