An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

See something, say something: USAF Eagle Eyes Program

  • Published
  • By Special Agent Don Tran
  • Air Force Office of Special Investigations
Regardless of how well trained and equipped AFOSI and security forces may be, we cannot be everywhere at all times. With this in mind, the Air Force Eagle Eyes Program was born. 

AFOSI, Detachment 804, is reminding the base populace they are a vital resource in ensuring the security for Team Vandenberg. Anyone, anywhere, at any time might have the information which would help solve crimes and ensure the safety of people and tangible assets.

Programs like Eagle Eyes are important because they ensure everyone does their part to maintain operational security and mission success, while reminding everyone that we all have a role in national security. As a Special Agent, it really gives me a peace of mind to know programs like this are enabling the base populace to become an extra layer of security in daily operations. 

There are three tip avenues which provide safe, discreet, and anonymous options to report criminal information, indicators of counterintelligence, or force protection concerns.

Individuals may text "AFOSI" and their tip to 274637 (CRIMES), log onto the Tip Submit website at, www.tipsubmit.com, or download the new smart phone application called "TipSubmit Mobile." This new application is the newest vehicle for submitting tips to many local, state and federal law enforcement agencies, including AFOSI. 

Here are some tips on what to look for:

(1) SURVEILANCE -- when someone is recording or monitoring activities. They are using cameras, either still or video, taking notes, drawing diagrams, annotating on maps or using binoculars, or other vision-enhancing devices.

(2) ELICITATION -- people or organizations attempting to gain information about military operations, capabilities, or people. Elicitation attempts may be made by mail, email, telephone, social media websites, or in person.

(3) TESTS OF SECURITY -- any attempts to measure reaction times to security breaches or to penetrate physical security barriers or procedures in order to assess strengths and weaknesses.

(4) ACQUIRING SUPPLIES -- purchasing or stealing explosives, weapons, or ammunition. This also includes acquiring military uniforms, decals, flight manuals, passes or badges, or the equipment to manufacture such items, or any other controlled items. Be sure to secure any restricted area badges or proxy cards, and military gear inside your home or on your person. Personally owned vehicles are an easy target, especially if they advertise military affiliation, such as bumper stickers, or military affiliation license plates. 

(5) SUSPICIOUS PERSONS or VEHICLES OUT OF PLACE -- people or vehicles that don't seem to belong around the workplace, neighborhood, business establishment, or anywhere else. Remember suspicious individuals - provide as much information as possible including gender, clothing type and color, approximate height, and distinguishing marks. For suspicious vehicles, remember the description to include color, make, model, and most importantly, a license plate number. Even a partial plate number is extremely helpful.

(6) DRY RUN -- putting people into position and moving them around according to their plan without actually committing the terrorist act. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow.

(7) DEPLOYING ASSETS -- people and supplies getting into position in order to commit the act. This is the last chance to alert authorities before the terrorist act occurs.

For more information, please contact AFOSI Det. 804, at (805) 606-1852.