An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Eagle Eyes program encourages reporting suspicious activity

  • Published
  • 88th Air Base Wing Public Affairs

With the Eagle Eyes anti-terrorism program personnel can, through a collective effort, aid in the prevention of terrorism through awareness, vigilant observation and reporting suspicious activities through the program’s communication channels.

To aid in the prevention of an attack, the program looks at six main activities which are likely to occur before an attack and can serve as trip wires to alert the vigilant observer that an attack may be imminent. Recognizing and reporting them could serve to stop that attack.

Those areas are surveillance, elicitation, tests of security, acquiring supplies, observing suspicious persons out-of-place, dry runs and deploying assets. These six markers, when observed and shared with authorities through the Eagles Eyes program, can provide the details needed to make the difference in preventing terrorism.

For the observer, recognizing the acquiring of supplies may mean extra vigilance coupled with critical thinking. The cost of not doing so, however, far outweighs any effort made.

As potential terrorists are acquiring supplies, those items could include purchasing or stealing explosives, weapons, ammunition, timers or detonators. Flight manuals and any other controlled items might be on their shopping list too. Other examples of supplies include uniforms or badges which could be used to disguise their identities or allow them to attract less scrutiny when carrying out the attack.

If you see something suspicious please report it immediately.  To help personnel describe specifically what they have seen, use the acronym SALUTE:

  • Size:  How many people?
  • Activity:  What was the individual(s) doing?
  • Location:  Where did it occur?
  • Uniform:  What was the individual(s) wearing?
  • Time:  When did you see it?
  • Equipment:  Were they driving a car, carrying equipment, or other items?

 Suspicious activities observed and then reported through the Eagle Eyes program are immediately shared with local law enforcement agencies, counter-terrorism personnel and military commanders for rapid assessment and investigation.

This Eagle Eyes contact information can be stored in the address book of a cellphone for quick retrieval when needed.

Always be on the lookout for suspicious activities and report any through Eagle Eyes immediately.