An official website of the United States government
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

News Search
NEWS | Oct. 19, 2010

Air Force gears up with Eagle Eyes in full force

By Special Agent Jonathan Nelson Air Force Office of Special Investigations, Detachment 310

Recent news reporting has focused on the possibility of terrorists attacks occurring around the world. As members of team Joint Base Charleston who contribute to the greater Department of Defense mission, it's incumbent upon all of us to always remain vigilant. One of the best ways to ensure vigilance contributes to security is Eagle Eyes.

Eagle Eyes, is a "global neighborhood watch program" created to promote an aware and involved community. The program encourages those on, as well as those off base, to be aware of the planning activities of a terrorist attack and to report them. Eagle Eyes ensures the community knows what to look for and how to report suspicious activity because with a well-informed community, terrorist acts can be prevented or at least mitigated.

The first important element to be aware of is surveillance. Overt surveillance may involve a person standing outside the gate jotting down notes or drawing a rough map, taking pictures, or using binoculars or other vision-enhancing devices. However, some surveillance is more covert, such as a "broken down" car in a place that allows its occupants the ability to observe on-base activities while waiting for "help."

In order to plan an attack, terrorists must acquire information about the base and its personnel. In the early stages this can be done by reading published information or searching the Internet, but at some point the terrorists will try to obtain undisclosed information; this is usually done through elicitation, which is the attempt to obtain security-related information without the proper clearance or need to know.

Elicitation may occur by phone, fax, e-mail, "snail" mail, or in person. A terrorist may call and pose as an Air Force member, asking to speak to a high-ranking Air Force official to find out if he or she is deployed or away from base. A stranger may approach an Air Force member in uniform at an off base restaurant and, feigning curiosity, strike up a conversation.

The third stage of planning a terrorist attack involves tests of security. This occurs when the terrorists attempt to measure the base's security reaction time and to assess its strengths or weaknesses. This may include someone driving at a high speed toward the gate to gauge the guards' reactions or it may involve a person hopping the fence and seeing how long he or she can elude the guards. At this stage, terrorists are interested in finding out the capability of the security they are up against, and how much they can get away with.

The very last step before a terrorist attack is the dry run. This is when the terrorists rehearse their plan, map out routes, and determine the timing and flow of their attack. After the rehearsal, the terrorists deploy their assets and get into position. At this point, they are putting on their masks and readying themselves to carry out their mission. This is the last opportunity to catch the terrorists before the attack occurs, so it is crucial to alert authorities immediately.

Law enforcement officers cannot be everywhere, so they need the eyes and ears of the entire community -- active duty, guard and reserve, military family members, civilian employees, defense contractors, merchants, neighborhoods, churches, schools, and civic groups. The community's assistance is critical in protecting the base, the community, and the country.

Anyone observing anything out of the norm or suspicious, on or off base, should report it immediately to the 628th Security Force Squadron, available 24 hours a day at 963-3600.