'Eagles Eyes' program helps keep Scott members out of harm's way Published Oct. 18, 2007 By MSgt. Brian Davidson 375th Airlift Wing Antiterrorism Office Scott Air Force Base, Ill. -- In recent days, the Office of Special Investigations, Detachment 301, has received reports of unusual activities that indicate people are attempting to gather intelligence about Joint Total Force Scott. Successfully mitigating threats against military members and installations begins with the ability to identify things that seem out of place, and the Air Force "Eagle Eyes" program is designed to do just that. While some Joint Total Force Scott members already watch for, and report, unusual people and activities, it takes everyone's involvement to help ensure complete force protection. "There are any number of threats against us that can be mitigated through the Eagle Eyes program," said OSI special agent Deryck Parks. "While the program is specifically aimed at antiterrorism, it also helps protect us from espionage and many other types of crime. Whether it's intelligence gathering by a well-known terrorist group like al Qaeda, a sexual predator looking for a victim or just a petty thief waiting for a target of opportunity, Eagle Eyes can stop these threats dead in their tracks." Just because Scott Air Force Base is surrounded by farms and quiet little communities doesn't mean it's not a target. According to recent reports, potential threats included activities such as an unidentified male who was spotted taking pictures near the Shiloh Gate and reports of calls made to on-base offices by an individual claiming to be an Air Force Reserve major who was seeking specific numbers of Scott Airmen who were deployed and their exact dates of return. Additionally, there were two unidentified males of Middle Eastern descent who approached military members at a local strip mall asking how they could get "access to the base." Upon learning that one of the Airmen they approached was a security forces member, the pair retreated. "Our role in ensuring an active Eagle Eyes program begins with teaching people about the typical activities terrorists engage in to plan their attacks," Agent Parks said. "Armed with this information, anyone can recognize elements of potential terror planning or crime when they see it." Next, the program provides a network of local, 24-hour phone numbers to call whenever a suspicious activity is observed. "Each of us, including our families, should learn the categories of suspicious behavior and be aware of our surroundings," said Tim West, Scott Antiterrorism officer. "If you observe something suspicious, no matter how small, report it immediately, and include as much information as possible. It's also important to remember that the Eagle Eyes program isn't limited to Scott's fence line -- unusual activities off-base should be reported as well." The OSI offers all Scott units educational briefings about the Eagle Eyes program. Commanders can request briefings by calling Agent Parks at 256-9059. To report suspicious individuals or activities, call the 375th SFS at 256-6000 or OSI at 256-5413. Reports can also be made by calling 9-1-1 or by notifying any supervisor, first sergeant or commander. A quick course in vigilance What is suspicious behavior? Surveillance - Surveillance is when someone attempts to record or monitor activities. This may include the use of any type of camera, note taking, drawing diagrams, annotating maps or using binoculars or other vision-enhancing devices. Elicitation - Elicitation is when a person or organization attempts to gain information about military operations, capabilities or people. Elicitation attempts may be made by mail, fax, telephone or in person. Examples could include someone who approaches a Joint Total Force Scott member at a gas station, mall, airport, library or any other location and asks about what's happening at the base. Tests of Security - Tests of security include any attempt to measure reaction times to security breaches or to penetrate physical security barriers or procedures in order to assess strengths and weaknesses. Examples include things like a person who grabs the base fence and shakes it to see how long it takes for police to respond or a driver who approaches the front gate without proper identification and pretends to be lost or to have taken a wrong turn just to learn the procedures of how the situation is dealt with and how far into the base someone can get before being turned around. Acquiring Supplies - Acquiring supplies means the purchasing or stealing of explosives, weapons, ammunition, detonators, timers or other such items. It also includes acquiring military uniforms, decals, flight manuals, passes or badges and the equipment to manufacture such items or any other controlled items. Suspicious Persons Out of Place - Suspicious persons out of place are those who don't seem to belong in the workplace, neighborhood or business establishment. This category is hard to define, but the point is that people know what looks right and what doesn't look right in their neighborhoods, offices and communities. If a person just doesn't seem like they belong, they probably don't. Dry Run - A dry run is when people get into position and move around according to a specific plan without actually committing the planned terrorist act. This is especially true in kidnappings but can also pertain to bombings. An element of this activity also includes mapping out routes and determining the timing of traffic lights and traffic flow. Take notice of people moving around from place to place without any apparent purpose. Deploying Assets - Deploying assets is when people and supplies are placed in position to commit the planned terrorist or criminal act. This is the last chance to alert authorities before the terrorist act occurs. Look for people who seem out of place, as if waiting for something to happen. One example of deploying assets is the Khobar Towers bombing in Saudi Arabia, when the explosives-laden truck was parked by the fence line and the driver jumped out and ran away.