What is Eagle Eyes Published Aug. 5, 2014 By Airman 1st Class Keith James 18th Wing Public Affairs KADENA AIR BASE, Japan -- The Eagle Eyes program is an Air Force anti-terrorism initiative that enlists the eyes and ears of Air Force members and citizens to watch, report and protect. This program teaches individuals about the typical activities terrorists engage in to develop their attacks, the signs to look for, possible targets, and how to report suspicious activities and potential terrorists planning. The war on terrorism is everyone's responsibility and by watching for suspicious behavior, taking action and reporting what you see, you play a critical role in preventing acts of terrorism. "OSI agents and Security Forces are limited in size and numbers," said Special Agent Terrell Harris, Air Force Office of Special Investigations, Detachment 624. "So it's extremely important that the Air Force community contributes by being our eyes and ears which helps to expand our outreach and capabilities when dealing with potential threats." Here at the 18th Wing we focus on our three strategic priorities: Fight Tonight, Win Tomorrow; Promote Joint, Bilateral and Multilateral Engagement and Ambassadorship; The Development of Professional Airmen and the Support of Kadena Warriors and Families. The Eagle Eyes program will provide the Airmen here with the tools to further support those priorities by instilling self-awareness and knowledge on how to recognize possible terrorist threats. The first step is knowing what to look for. According to Air Force Office of Special Investigations officials, there are seven categories of suspicious behavior to watch out for: Surveillance: Someone recording or monitoring activities. This may include the use of still or video cameras, note taking, drawing diagrams, map making or using binoculars -- especially near gates or flight lines. Elicitation: People or organizations attempting to gain information about military operations, capabilities or people. Elicitation attempts may be made by mail, fax, e-mail, telephone or in person. Tests of security: Any attempts to measure reaction times to security breaches or to penetrate physical security barriers or procedures in order to assess strengths and weaknesses. Acquiring supplies: Someone purchasing or stealing explosives, weapons, ammunition, detonators or timers. It can also include acquiring military uniforms, decals, flight manuals, passes or badges, or the equipment to manufacture such items or any other controlled items. Suspicious people: People who seem out of place or don't seem to belong in the workplace, neighborhood or business establishment. Dry run: Putting people into position and moving them around according to their plan without actually committing the terrorist act. This is especially true when planning a kidnapping, but it can also pertain to bombings. An element of this activity could include mapping out routes and determining the timing of traffic lights and flow. Take note of people moving around from place to place without any apparent purpose and doing it, perhaps, many times. The appropriate example here is the 9/11 hijackers, who are now known to have actually flown on those exact flights several times before the attack, working out arrival times, parking, ticketing, going through security and boarding. Deploying assets: People and supplies getting into position to commit the act. This is a person's last chance to alert authorities before the terrorist act occurs. Look for people loading vehicles with weaponry or explosives, strange-looking people in military uniforms, or people who seem out of place standing by at a certain location as if waiting for something to happen. "Deploying of assets is usually the stage were we catch terrorists," said Harris. "It's the time where people are most nervous and stand out from the crowd." Having great communication with not only your squadron, but your family is vital to help stopping threats. Ways to help lower your chances of becoming a target include using operational security, not making a scene, watching what you say and do on social media websites, maintaining situational awareness and being aware of the warning signs. "All of us can be potential targets, not only active duty; but also their families whether it be through elicitation or all the way to terrorist threats, it effects all of us," said Harris. Reporting is a big part of program and there are multiple ways to report suspicious activity. The program provides a network of local, 24-hour phones to call whenever a suspicious act or activity is observed. You can call the law enforcement desk, the direct OSI line or contact crime busters. When reporting, remember to give as many details possible, being too vague can slow down the process of identifying a threat. Pictures are great identifiable objects that give agents and law enforcements members a better visual of the situation and further increase their capabilities of eliminating that threat. "Not making excuses for something suspicious occurring and reporting it the key," said Harris. "It's never too late to report suspicious activity." For more information or to report suspicious activities contact the law enforcement desk at 634-2475 or OSI at 634-5300.