Éditoriaux Défense Sécurité Terrorisme Zones de conflits Logistique Livres de référence Liens
Terre Air Mer Gendarmerie Renseignement Infoguerre Cyber Recherche

New Program Targets Terrorism

New Program Targets Terrorism

By Major Mike Richmond, Air Force Office of Special Investigations Public Affairs.

Washington D.C. -- (AFPN) April 30, 2002 -- A new anti-terrorism initiative from the Air Force Office of Special Investigations is taking root around the world.

Called "Eagle Eyes," the program aims to prevent terrorism by encouraging and enabling Air Force members and citizens to report terrorist planning activities they observe. The program also features processes for rapid follow-up investigations and information sharing to other echelons of command and other law enforcement agencies as appropriate.

"Terrorism is always preceded by planning steps, and those steps are observable if you know what to look for," said Maj. John Gamache, an OSI special agent working homeland security threat and investigative issues from OSI headquarters at Andrews Air Force Base, Md. "This program seeks to educate the masses, both on base and off, on what those activities are, and then what to do about it if you see something suspicious."

Gamache said "Eagle Eyes" officially came to life April 18 when Air Force Chief of Staff Gen. John Jumper signed a memo endorsing the program. Weeks earlier, however, OSI detachments and security forces squadrons around the globe began establishing local reporting processes in anticipation of the program’s launch.

"Security forces are full partners in this initiative," Gamache said. "Their participation is crucial to making this work at the installation level."

While local reporting processes may differ slightly, in most cases people will be advised to report suspicious activity to their security forces desk.

"Our squadrons have the advantage of being manned 24 hours a day, all year round, so there’s never a time that a person couldn’t report a suspicious activity to us," said Maj. Mel Allen of the Air Force headquarters security forces directorate. "Once a call comes in, our cops will notify the OSI right away to investigate, and depending on what the nature of the call is, we can respond to the situation immediately if that’s what’s called for."

According to Gamache, widespread promotion of the program is critical to its success.

"It’ll do no good to build speedy reporting and investigating processes if people don’t know what to report," Gamache said. "And for that reason, a substantial promotional campaign is built into the program."

Gamache said program promotion will include base newspaper articles, briefings at commanders’ calls and presentations to newcomers, family members and off-base populations. Additionally, an official program logo is being designed and will eventually be applied to educational handouts.

The publicity campaign targets a large and diverse audience.

"It’s important that this campaign reaches as many people as possible, to include not just military people, but civilian workers, family members, contractors, off-base merchants, community organizations, neighborhoods, you name it," Gamache said.

"Our agents can’t be everywhere and neither can the security forces personnel," he said, "so we’re enlisting the eyes and ears of everybody. We’re saying, ‘You know best what does or doesn’t belong in your neighborhood, in your work area, on your drive to work, so you’ll be able to spot something that doesn’t quite look right and phone it in.’"

Gamache identified seven categories of suspicious activities that warrant reporting:

  • Surveillance. Someone recording or monitoring activities. This may include using cameras (either still or video), taking notes, drawing diagrams, annotating on maps, or using binoculars or other vision-enhancing devices.
  • Elicitation. People or organizations attempting to gain information about military operations, capabilities, or people. Elicitation attempts may be made by mail, fax, telephone, or in person.
  • Tests of security. Any attempts to measure reaction times to security breaches or to penetrate physical security barriers or procedures in order to assess strengths and weaknesses.
  • Acquiring supplies. Purchasing or stealing explosives, weapons, ammunition, etc. Also includes acquiring military uniforms, decals, flight manuals, passes or badges (or the equipment to manufacture such items) or any other controlled items.
  • Suspicious persons out of place. These are people who don’t seem to belong in the workplace, neighborhood, business establishment, or anywhere else. This includes suspicious border crossings and stowaways aboard ship or people jumping ship in port.
  • Dry run: Putting people into position and moving them around according to their plan without actually committing the terrorist act. This is especially true when planning a kidnapping, but it can also pertain to bombings. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow.
  • Deploying assets: People and supplies getting into position to commit the act. This is a person’s last chance to alert authorities before the terrorist act occurs.

Besides investigating each report, Gamache said OSI detachments will share the information with their "watch team" at OSI headquarters, which compiles such reports and pushes them out electronically in near real-time to other levels of command and to other law enforcement agencies.

Local OSI detachments have more information on local reporting procedures and how to schedule an Eagle Eyes briefing.


Derniers articles

Verdun 2016 : La légende de la « tranchée des baïonnettes »
Eyes in the Dark: Navy Dive Helmet Display Emerges as Game-Changer
OIR Official: Captured Info Describes ISIL Operations in Manbij
Cyber, Space, Middle East Join Nuclear Triad Topics at Deterrence Meeting
Carter Opens Second DoD Innovation Hub in Boston
Triomphe de St-Cyr : le Vietnam sur les rangs
Dwight D. Eisenhower Conducts First OIR Missions from Arabian Gulf
L’amiral Prazuck prend la manœuvre de la Marine
Airmen Practice Rescuing Downed Pilots in Pacific Thunder 16-2
On ne lutte pas contre les moustiques avec une Kalachnikov...
Enemy Mine: Underwater Drones Hunt Buried Targets, Save Lives
Daesh Publications Are Translated Into Eleven Languages
Opération Chammal : 10 000 heures de vol en opération pour les Mirage 2000 basés en Jordanie
Le Drian : Daech : une réponse à plusieurs niveaux
Carter: Defense Ministers Agree on Next Steps in Counter-ISIL Fight
Carter Convenes Counter-ISIL Coalition Meeting at Andrews
Carter Welcomes France’s Increased Counter-ISIL Support
100-Plus Aircraft Fly in for Exercise Red Flag 16-3
Growlers Soar With B-1s Around Ellsworth AFB
A-10s Deploy to Slovakia for Cross-Border Training
We Don’t Fight Against Mosquitoes With a Kalashnikov
Bug-Hunting Computers to Compete in DARPA Cyber Grand Challenge
Chiefs of US and Chinese Navies Agree on Need for Cooperation
DoD Cyber Strategy Defines How Officials Discern Cyber Incidents from Armed Attacks
Vice Adm. Tighe Takes Charge of Information Warfare, Naval Intelligence
Truman Strike Group Completes Eight-Month Deployment
KC-46 Completes Milestone by Refueling Fighter Jet, Cargo Plane
Air Dominance and the Critical Role of Fifth Generation Fighters
Une nation est une âme
The Challenges of Ungoverned Spaces
Carter Salutes Iraqi Forces, Announces 560 U.S. Troops to Deploy to Iraq
Obama: U.S. Commitment to European Security is Unwavering in Pivotal Time for NATO
International Court to Decide Sovereignty Issue in South China Sea
La SPA 75 est centenaire !
U.S. to Deploy THAAD Missile Battery to South Korea
Maintien en condition des matériels : reprendre l’initiative
La veste « léopard », premier uniforme militaire de camouflage
Océan Indien 2016 : Opérations & Coopération
Truman Transits Strait of Gibraltar
Navy Unveils National Museum of the American Sailor
New Navy, Old Tar
Marcel Dassault parrain de la nouvelle promotion d’officiers de l’École de l’Air
RIMPAC 2016 : Ravitaillement à la mer pour le Prairial avant l’arrivée à Hawaii
Bataille de la Somme, l’oubliée
U.S., Iceland Sign Security Cooperation Agreement
Cléopatra : la frégate Jean Bart entre dans l’histoire du BPC Gamal Abdel Nasser
Surveiller l’espace maritime français aussi par satellite
America's Navy-Marine Corps Team Fuse for RIMPAC 2016
Stratégie France : Plaidoyer pour une véritable coopération franco-allemande
La lumière du Droit rayonne au bout du chemin

Directeur de la publication : Joël-François Dumont
Comité de rédaction : Jacques de Lestapis, Hugues Dumont, François de Vries (Bruxelles), Hans-Ulrich Helfer (Suisse), Michael Hellerforth (Allemagne).
Comité militaire : VAE Guy Labouérie (†), GAA François Mermet (2S), CF Patrice Théry (Asie).