Eagle Eyes Program Encourages Reporting of Suspicious Activity > Air Force Materiel Command > Article Display

Through the Eagle Eyes counterterrorism program, staff can, through a collective effort, contribute to the prevention of terrorism through awareness, vigilant observation and the reporting of suspicious activity through the program’s communication channels.

To aid in the prevention of an attack, the program examines six main activities that are likely to occur prior to an attack and can serve as tripwires to alert the vigilant observer that an attack may be imminent. Recognizing and reporting them could serve to stop this attack.

These areas are surveillance, elicitation, security testing, acquiring supplies, observing suspicious people outdoors, simulations, and deploying assets. These six markers, when observed and shared with authorities through the Eagles Eyes program, can provide the details needed to make a difference in preventing terrorism.

For the observer, recognizing the acquisition of supplies can mean heightened vigilance coupled with critical thinking. The cost of not doing so, however, far outweighs any effort.

As would-be terrorists acquire supplies, these items could include purchasing or stealing explosives, weapons, ammunition, timers, or detonators. Flight manuals and any other controlled items may also be on their shopping list. Other examples of supplies include uniforms or badges that could be used to conceal their identity or allow them to attract less attention when carrying out the attack.

If you see anything suspicious, please report it immediately. To help staff accurately describe what they saw, use the acronym GREET:

  • Cut: How many people?
  • Activity: What was the person(s) doing?
  • Location: Where did this happen?
  • Uniform: What was the person(s) wearing?
  • Time: When did you see him?
  • Equipment: Were they driving a car, carrying equipment or other objects?

Suspicious activity observed and subsequently reported through the Eagle Eyes program is immediately shared with local law enforcement, counterterrorism personnel, and military commanders for prompt assessment and investigation.

This Eagle Eyes contact information can be stored in a cell phone’s address book for quick retrieval when needed.

Always be on the lookout for suspicious activity and report it immediately through Eagle Eyes.

Comments are closed.