Joint Base Charleston


USAF Eagle Eyes and eGuardian Programs – As important as they sound

By Olin Thomas | Installation Antiterrorism advisor | March 07, 2014

JOINT BASE CHARLESTON, S.C. -- My office counterpart and I were discussing what antiterrorism awareness topics we should submit to increase awareness for our installation and we thought we should start with the basics; to report suspicious activity as part of the Eagle Eyes Program, explain why it so important to do so, and to discuss the eGuardian Program.

The Eagle Eyes program is an Air Force anti-terrorism initiative that enlists the eyes and ears of Air Force members and citizens in the war on terror. You can view information about Eagle Eyes at Eagle eyes teaches about the typical activities terrorists engage in to plan their attacks. Armed with this information, you can recognize elements of potential terror planning when you see it. The program provides a network of local, 24-hour phone numbers to call whenever a suspicious activity is observed. You and your family are encouraged to learn the categories of suspicious behavior and stay attuned to your surroundings. If you observe something suspicious, send your input via e-mail to or alert local authorities. You may also submit a confidential web tip at

The eGuardian system is a sensitive, unclassified reporting system developed, owned and run by the Federal Bureau of Investigation to collect terrorist threat and suspicious activity information having a potential link to terrorism. This information is shared with federal, state, local and tribal law enforcement.

In May 2010, the Secretary of Defense designated the eGuardian system as the authorized DOD law enforcement suspicious activity reporting system. At Joint Base Charleston, only the Air Force Office of Special Investigations or the Naval Criminal Investigative Service have the ability to enter information into the eGuardian system, but that information is available for review by the 628th Security Forces Squadron, as well as state and local law enforcement agencies. In our area, AFOSI and NCIS have excellent working relationships with the South Carolina State Fusion Center and our local agencies.

On JB Charleston, each report is investigated by the 628th SFS, or AFOSI or NCIS, to rule out any immediate threat to the installation. Once the preliminary response is complete, the information may be entered into the eGuardian program for threat and suspicious activity reporting.

The eGuardian system receives hundreds of pieces of information each year from law enforcement agencies, private organizations and citizens throughout the United States. The FBI Joint Terrorism Task Forces task is to analyze and evaluate all the information they receive using a set of analytical programs and determine if there is any relationship between these individual pieces of information and possible terrorist or criminal activity. If this analyzed information reveals potential criminal or terrorist activity, it is then shared with key state and federal law enforcement and counterterrorism agencies.

The suspicious activity you report today, though it may appear at the time to be unimportant or minor, may be the one small piece of the puzzle that completes the picture and leads to another victory in the war on terrorism. Remember, since the attacks of Sept. 11, 2001, there have been more than 55 terrorist attacks foiled. Many of these attacks were foiled because someone like you saw something and said something.

What to report

(1) Surveillance: When someone is recording or monitoring activities, are using cameras (either still or video), note taking, drawing diagrams, annotating on maps, or using binoculars or other vision-enhancing devices.

(2) Elicitation: People or organizations attempting to gain information about military operations, capabilities or people. Elicitation attempts may be made by mail, fax, telephone or in person.

(3) Tests of security: Any attempts to measure reaction times to security breaches or to penetrate physical security barriers or procedures in order to assess strengths and weaknesses.

(4) Acquiring supplies: Purchasing or stealing explosives, weapons, ammunition, etc. Also includes acquiring military uniforms, decals, flight manuals, passes or badges (or the equipment to manufacture such items) or any other controlled items.

(5) Suspicious persons/vehicles out of place: People or vehicles that don't seem to belong around the workplace, neighborhood, business establishment or anywhere else. *Remember for suspicious individuals; provide as much information as possible including gender, clothing type and color, approximate height, distinguishing marks, etc. For vehicles, a vehicle description to include color, make, model and most important, a license plate number (even a partial plate number) is extremely helpful.

(6) Dry run: Putting people into position and moving them around according to their plan without actually committing the terrorist act. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow.

(7) Deploying assets: People and supplies getting into position in order to commit the terrorist act. This is the last chance to alert authorities before the terrorist act occurs.

Remember, if you see something, say something. Report suspicious behavior to:
JB Charleston - Air Base: 843-963-3248
AFOSI: 843-963-3248 / input via e-mail to / submit a confidential web tip at

JB Charleston - Weapons Station: 843-764-7777
NCIS: 843-764-7800

South Carolina State Law Enforcement Division: 1-888-559-8477 / 803-896-7133
FBI: 843-881-0194

Staying Connected