Advanced search Help
Searching for terms: EXACT: "Air University (U.S.). Air Command and Staff College" in: publisher
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Future Roles of Air and Space Power in Combatting Terrorism
Terrorism poses a growing threat to the United States, its interests, and its allies. The political, economic, and informational instruments of power play primary roles in addressing and eliminating the root causes behind terrorism attacks, but the military instrument will prevent some attacks and retaliate for others. Air and space power is one of the primary components of the military instrument in the battle against terrorism. This paper begins with an overview of US national and Department of Defense counterterrorist (CT) policies, performs a systems model analysis of a terrorist organization to better understand targeting of the same, reviews current air and space power CT capabilities, and concludes with recommendations for future ones. Air and space power contributes to current CT capabilities by providing global mobility for special operations forces, air superiority to protect those forces, and precision strike capability to target terrorist infrastructures. It also provides intelligence critical to deterring, preempting, and answering terrorist attacks, and provides psychological operations support to help erode terrorist will and popular support. Although there is no "silver bullet" to use against terrorists, future improvements in air and space power will enhance CT capability effectiveness and provide expanded options. This paper's research consisted of review of primary and secondary sources and interviews with terrorism and targeting experts.
Air University (U.S.). Air Command and Staff College
McAlpine, Mark S.
1997-03
-
The Fallacy of Attribution to Achieve Deterrence in Cyberspace
"The ability to determine the responsible party of a military attack and convince a would-be attacker that one has the ability to determine this culpability constitutes a key capability for nations wishing to deter aggression. However, within domain of cyberspace, a belligerent state, non-state and/or criminal actor can manipulate elements of the domain to shroud and/or maliciously redirect culpability elsewhere. In such an environment, is the basic premise of deterrence (threat of retaliation or denial of benefits to the attacker) still viable? This research paper will look at the problem of attribution from both a technical and national policy standpoint. Specifically, the research will briefly describe the technical problems challenging attribution and review some of the proposed solutions. Further, the research will examine the problem of attribution from a national policy standpoint to outline the potential policy solutions that could provide alternate solutions outside or in addition to the purely technical ones as well as highlight consequences of some of the proposed solutions.This paper argues that a central focus on attack attribution to enable a retaliatory response as a means to accomplish deterrence presents an untenable, unsustainable strategy. Cyberspace, unlike other domains of air, space, land and sea, provide the ability to recreate the domain at will to complicate an attackers ability to penetrate. This paper argues that old ideas of centralization and hardening for defense should give way to ideas of randomly moving cyber attack surfaces (logically defined vice physically defined) in order to rebalance the current asymmetry between attacker and defender. Transformative security in cyberspace can only take place when industrial age ideas are supplanted by modern information age ideas that exploit the strengths of the malleable cyber domain to ensure security. Defenders should turn the advantages that favor the offense on its head."
Air University (U.S.). Air Command and Staff College
Johnson, Robert J.
2015-04-01
-
Operationalizing Cyberspace for Today's Combat Air Force
"This study researches the question, 'What does the CAF [Combat Air Force] operator need to know about CNO [computer network operations]?' Section 1 provides the framework for the discussion as well as key background information regarding current United States Government strategic views and DOD views on cyberspace. Section 2 begins the CNO education by showing where CNO fits into the overarching information operations construct and concludes by providing a generic discussion of the interaction between each of the elements. Section 3 furthers the discussion by detailing how cyber forces are organized. Section 4 outlines the importance of CNO to the warfighter. Section 4 also lends vulnerability and capability analysis in an effort to drive the CAF mission planner or operator to think in terms of desired effects. Section 5 highlights a few of the key operational challenges in the areas of doctrine, organizational thought and system architecture, education and training, and planning in order to highlight issues that may hamper CNO support to the warfighter. The author concludes that it is vital for the CAF operator to have working knowledge of CNO -- organization, importance, and challenges -- in an effort to facilitate better integration into the warfighting structure. This study provides that knowledge while also offering recommendations to promote more efficient joint cross-domain operations."
Air University (U.S.). Air Command and Staff College
Simmons, Travolis A.
2010-04
-
Measuring Cyber Operations Effectiveness
From the thesis abstract: "This paper outlines the various methods currently used to show the effectiveness of Network Operations, Cyber Defensive, and Offensive operations. Network operations effectiveness depends on the view of the person measuring it. It is a delicate balance of usability versus security with the mission of the network providing a guide. Network Defense can be measured using many automated tools, included in the defense hardware and software itself. These devices include hardware and software firewalls, Network Intrusion Detection and Prevention Systems. Security Information Event Management software allow the ingestion of all of the above system data into a single cohesive picture better able to detect advanced threats. The effectiveness of these devices and software can be measured through auditing using network scanners and frameworks like the SANS Critical Security Controls. Finally, a network vulnerability penetration test can be performed to test the systems and controls put in place to ensure they are working as designed. Penetration tests should use a framework like the Penetration Test Execution Standard in order to provide standardized and reproducible results. Measuring success in Offensive and Computer Network Exploitation depends on the goal. If the goal is to exfiltrate information and it was obtained without being detected the operation was a success. Attacks to degrade or harm systems can be measured if the end goal of the attacker can be determined. [...] In Partial Fulfillment of the Graduation Requirements for the Degree of MASTER OF OPERATIONAL ARTS AND SCIENCES"
Air University (U.S.). Air Command and Staff College
Neace, Denney L.
2014-11
-
Counterinsurgency Aircraft Procurement Options: Processes, Methods, Alternatives, and Estimates
"A call is being made for an aircraft dedicated to the counterinsurgency (COIN) mission within military academic circles and the special operations community. Support for a COIN aircraft needs hard numbers, given the Air Force's budget constraints brought on by the dedication to the F-22A. Building on Arthur Davis's COIN aircraft advocacy paper, this research doesn't focus on further advocacy, but on a process and method for COIN aircraft procurement. The acquisition focus is on United States Special Operations Command's (USSOCOM) acquisition authority to couple its global war on terrorism (GWOT) mission responsibility with commercial-off-the-shelf aircraft procurement to specifically address the need for an airborne COIN capability. The performance, schedule, and cost information associated with Raytheon's T-6A NTA and Stavatti's SM-27 are reviewed and compared beyond the acquisition process. Additionally, acquisition and operations, maintenance and support cost estimates are produced for both alternatives. The estimates reflect respective acquisition costs of approximately $211 million and $426 million; and maintenance, and support costs of $38 million and $47 million, respectively. The latter two costs are stated in fiscal year (FY) 2007 dollars. The analysis of alternatives yields a recommendation based on the three key acquisition areas of performance schedule, and cost. The T-6A NTA platform possesses demonstrated performance, immediate availability, and lower costs, and is recommended by this analysis."
Air University (U.S.). Air Command and Staff College
Peeler, David L.
2009-08
-
AFSOC Adopting A Globemaster View
"At present, AFSOC [Air Force Special Operations Command] lacks a heavy airlift capability to support special operations warriors. The author seeks to determine the most effective means to expeditiously transport special operations troops and equipment by examining the current process, interviewing several key AMC [Air Mobility Command] and AFSOC individuals, and developing long held beliefs. The current arrangement relies on support by Air Mobility Command to supply aircraft and aircrews to USSOCOM [United States Special Operations Command] units for direct support. This approach is flawed in two fashions. First, these AMC aircrews are restricted by conventional AMC regulations and command and control procedures. This creates a lack of experience and knowledge base within special operations units and AMC for effective decision making and control. Secondly, AFSOC should maintain complete control of all special operations airlift for greater mission focus amongst the aircrew and better decision making at leadership levels. Ultimately, while moving AMC‟s special operations support mission to AFSOC would provide greater special operations support, the convenience of the status quo makes such a move prohibitive."
Air University (U.S.). Air Command and Staff College
Harris jr., James D.
2010-04
-
Guilt-Free War: Post-Traumatic Stress and an Ethical Framework for Battlefield Decisions
From the abstract: "Post-traumatic stress disorder (PTSD) affects roughly 15 percent of all
combat veterans. In a combat situation, when a warrior experiences a
moral dilemma that violates a deeply held conviction, he or she suffers a
moral injury. These moral injuries and the combat guilt that accompanies
such injuries are a leading cause in the development of PTSD. Today's
warriors are even more vulnerable to moral injuries, given the ambivalence
surrounding morality in general. Compounding this situation are
increasingly restrictive rules of engagement against an unseen enemy
who does not appear to follow any rules at all. These dynamics increase
the vulnerability of US warriors to moral injuries. Given the connections
between moral injury, guilt, and post-traumatic stress, this paper seeks to
open a dialogue on the need for the development of an ethical framework
that can guide warriors in making battlefield decisions, providing possible
armor against moral injury and assisting warriors in their reflection
on previous involvement."
Air University (U.S.). Air Command and Staff College
Sackett, John G.
2015-12
-
Attitude Survey: Police and Fire Service Integration
"The purpose of this study is to further the existing research into the area of consolidation of some or all of the emergency services on an Air Force installation. In the context of this work, these 'emergency services' will generally include the fire department (fire protection branch), security police, disaster preparedness, and ground safety. A 1983 research project completed by a student of the Air Command and Staff College indicated certain organizational changes would result in a more efficient use of manpower with an associated reduction in costs. The research question now under examination is whether or not there is sufficient support within the affected career fields to suggest that a pilot program of the consolidation concept be implemented."
Air University (U.S.). Air Command and Staff College
Hoffmaster, Jan C.
1986-04
-
Bioweapons Trafficking
"The goal of this research is to explore the potential for a terrorist group to use a biological agent to attack the United States. First, I will provide an overview of the utility of bioweapons. Second, I will examine the abilities of terrorist groups to produce bioweapons, and third, I will analyze the ease with which they may transport bioweapons into the United States. All research is limited to that available in the public domain, commonly called 'open source intelligence.'"
Air University (U.S.). Air Command and Staff College
Legawiec, Christine F.
2010-03-31
-
Norway's Impact on the New Strategic Concept
From the Introduction: "As NATO is in the process of developing a new Strategic Concept (SC), Norway is one of the small European countries trying to make an important contribution to the future of NATO. During the Cold War the Norway-Russia border along with Arctic military considerations meant that Norway was important to the security of NATO, but afterwards the focus of NATO shifted to other regions of Europe, particularly the Balkans. With the start of the international efforts to fight terrorism, NATO's focus has been drawn even farther afield to places like Afghanistan. These developments make it impossible for Norway to continue to wield influence in NATO disproportionate to its size based solely on classic defense considerations, so it is likely to appeal to other issues. The Norwegian contribution to the ongoing transatlantic security and defense dialogue and ultimately to the new Strategic Concept can be estimated by an examination of Nordic cooperation and the High North as key drivers of Norwegian security and defense policy."
Air University (U.S.). Air Command and Staff College
Pound, Gregory T.
2010-03
-
Why Do States Build Nuclear Weapons? Proliferation Models as Concurrent Pressures on a State
From the Abstract: "Why do states acquire nuclear weapons? In this paper, I look at three primary theoretical models of nuclear proliferation--Security Concerns, Domestic Politics, and Norms--and argue that the models inform why states seek nuclear weapons more accurately when applied together as distinct pressures on a state instead of as separate instances of reasoning. These three models are not always complete by themselves, but instead, each model is actually a definition of a pressure or force that acts upon states to move them towards or away from nuclear weapons. When present, these pressures act simultaneously with each other such that there is consistent force working on a state's decisions, potentially over the course of many years with changes to each of the pressures over time. By applying each proliferation model together, I argue that nuclear proliferation occurs when Domestic Politics-Positive pressures and Normative-Positive pressures are greater than Domestic Politics-Negative pressures and Normative-Negative pressures given that a state is facing a Security threat. This hypothesis is scrutinized through the case study of India's proliferation and shows the progressive increase of nuclear positive pressures vis-à-vis nuclear negative pressures."
Air University (U.S.). Air Command and Staff College
Curtice, Scott
2021-03
-
Have the Basic Requirements of Arms Control Changed Since Efforts were First Made?
This paper attempts to answer the question, Have the basic requirements of arms control changed since efforts were first made? It traces the evolution of arms control attempts from ancient times to the present, and examines some selected past attempts to prevent and control arms proliferation. Finally, the paper concludes with a suggestion about the prospects and potential fate of future arms control efforts. The Rush-Bagot Agreement the Washington Naval Treaty, and the Geneva Protocol on Chemical and Biological Warfare are quoted.
Air University (U.S.). Air Command and Staff College
Starkes, Sheldon D.
1985-04
-
Cyberspace Protection and Theory
From the Thesis Abstract: "This paper provides Air Force Space Command (AFSPC) suggestions on cyber protection and theory. First, AFSPC must instill a sense of cybermindedness to all network-based resource users. This includes daily actions and in-processing/out-processing events. Secondly, AFSPC must lead the charge to establish a common naming convention for all cyber resources, thus promoting a familiarity with capabilities as in the air, land, sea, and space environments. Next, AFSPC must conduct a study leading to the formation of a cyber standard model, similar to the standard atmosphere model used in aviation. Specifically, AFSPC needs to study the establishment of a test and evaluation standard model for cyber networks. Finally, AFSPC must use enterprise wide network traffic generation as a means of tactical deception for cyber protection. This concept will hide true network traffic in the midst of scheduled, characterized, realistic, and random network data, and is analogous to the concept of chaff's effect on radar cross section. These recommendations are based on years of experience in network operations, flight and information operations systems test, and the thoughts of flight test and network security engineers. Adherence to these recommendations will provide AFSPC a decisive edge in cyber operations."
Air University (U.S.). Air Command and Staff College
Grant, Marion
2010-04-06
-
Persistent Perch: USSOCOM's Use of Organic Space Based ISR
From the Thesis Abstract: "US Special Operations Command (USSOCOM) has, for the better part of the past decade, been America's lead combatant command in the fight against terrorism. SOCOM has a demanding repertoire of activities that require significant support from a variety of different warfighting enablers, most notably intelligence, surveillance, and reconnaissance (ISR) assets. In order to augment and supplement the command's dependence on persistent air-breathing ISR orbits, USSOCOM needs to consider fielding the capability to procure, configure, launch, and control its own constellation of space based ISR satellites. Space based ISR has the potential to provide the command with near real time imagery intelligence (IMINT) over areas of the world that are anti-access or area denied (A2AD). A2AD areas of the globe frustrate SOCOM planners and operators as the feasibility to park an airborne ISR asset over an A2AD environment for weeks on end is neither feasible nor possible. If SOCOM leveraged nascent technologies, like CubeSats and fractionated satellite architecture, the command could procure, launch, and control its own satellite constellations cheaper than traditional satellite systems or airborne ISR vehicles."
Air University (U.S.). Air Command and Staff College
Helms, Christian P.
2015-05
-
Assessment of the Clash of Civilizations Debate
From the Document: "Throughout history, man has attempted to understand world events and the relationships between countries in order to craft foreign policy as well as predict future interactions. The end of the Cold War was no different. As the Berlin Wall fell and the USSR's [Union of Soviet Socialist Republics] communist ideology dissolved, the United States no longer viewed the Russians as its enemy. Capitalism and liberal democracy had triumphed over communism. US foreign policy makers and academia grappled with what the new world political stage would look like."
Air University (U.S.). Air Command and Staff College
Rammel, Amy
-
Policy and Doctrine Impacts of Semi and Full Autonomous ISR and Weaponized RPA
From the Document: "Remotely Piloted Aircraft (RPA) have performed a myriad of missions in their brief service history--from initial Intelligence Surveillance Reconnaissance (ISR) support operations in the Balkans to performing kinetic strike missions in todays counterterrorism struggle. Innovative mission sets are continually being introduced such as RPA airborne communication data relays. The revolutionary capabilities that RPA deliver have not been without problems, namely in the realm of Command and Control (C2), the sheer variety of RPA operations, and in the acquisition process. Despite this, RPA are here to stay--their numbers have increased from an estimated 167 in 2003 to 5331 in 2008 with the trend expected to continue."
Air University (U.S.). Air Command and Staff College
Gaeta, Douglas
2010-01-01?
-
Department of Defense Civil Support Integration
From the Thesis Abstract: "The Department of Defense is appropriately responsible for Homeland Defense and established Northern Command to execute this mission. In addition to Homeland Defense, Northern Command is responsible for supporting the Department of Homeland Security with civil support and ensures the safety of United States citizens during events such as man-made and natural disasters. It is not a matter of 'if' another mass casualty event will occur within the United States, but a question of 'when' the next event will occur. Preparedness does not mean just knowing what your responsibilities are and those of other agencies, but practicing and putting that knowledge to the test. While DHS has numerous opportunities to put its systems to the test with local and state agencies, the Department of Defense, on the other hand, does not get these same, frequently occurring opportunities. Existing legal constraints, high operational tempo, and lack of coordination efforts between the DHS and DOD contribute to an unprepared response for civil support. Communication of local DOD capabilities and local governance requirements needs to be understood by governors and local military commanders. In addition, plans and memorandums of agreements need to be developed and put into practice."
Air University (U.S.). Air Command and Staff College
Neumann, Kevin M.
2010-12
-
Reengineering Defense Acquisition: A Concept of Operations for Waging the Acquisition Campaigns of the 21st Century
The defense acquisition system has earned a reputation of being unable to provide the weapons the warfighters need at a value the Congress and American taxpayers deserve. At the macro level, acquisition is the convergence of five processes--requirements, technology, budgeting, management and operations and support. Micro-management of acquisition execution, when coupled with unstable requirements, technology and budgeting processes, results in a system that is not responsive to the customers' needs. It is time to implement dramatic changes based on a process-oriented reengineering of the entire system and radically improve its performance. To generate recommendations for system improvement, we assessed and restructured the top-level, macro processes associated with defense acquisition--relying on the time-proven tenet of centralized control with decentralized execution. To address current system shortfalls, we propose greatly expanding the role of the joint staff in preparing, planning and executing joint acquisition campaigns. The authors suggest the Department of Defense (DoD) execute acquisition campaigns by mirroring the way military forces plan and execute joint battle campaigns. They suggest process improvements which will strengthen the link between requirements definition and technology insertion. They also suggest altering the budgeting process to enable the DoD to submit a more unified budget position each fiscal year. They then developed a phased, methodical approach for implementing the proposed changes. The recommendations are controversial. The authors are challenging dogmatically accepted paradigms regarding the way the DoD bureaucracy functions and the roles of the joint staff. Before any of the proposed changes can be implemented, dramatic changes in current laws will have to occur. The recommendations are not consistent with either the current interpretations of Title 10 or the law governing the size of the Joint Staff. However, only by changing the current bureaucratic organizations and culture will the acquisition community have a chance at providing the capabilities US warfighters need in the resource constrained environment in which the DoD will continue to find itself.
Air University (U.S.). Air Command and Staff College
Martin, Laura; Starkey, Loretta; Wandrey, Jeffrey
1995-05
-
Winning Hearts and Minds Is Not for Amateurs: Preparing to Negotiate
From the thesis abstract: "U.S. military forces have repeatedly been expected to perform in peacekeeping, nation-building and other non-kinetic roles throughout history. However, in recent years, the U.S. military has been awakened to its lack of preparedness for full spectrum operations. Two factors, the publication of DoD Directive 3000.05 and recent studies of negotiation in Iraq may help pave the way for improved training in negotiation, one of these non-kinetic skill areas. Reviewing these recent reports led the author to assess the negotiation training currently provided to Provincial Reconstruction Teams (PRT). Likewise, to provide additional perspective, the author examined how the Canadians prepare their PRTs to negotiate effectively. This report examines current negotiation training provided to U.S. and Canadian PRTs and evaluates the current training. After reviewing both training programs, some areas for improvement were noted. The training provided to U.S. PRTs is improving every year, but should include more academics, more practice negotiating, and training for all team members. To their credit, U.S. PRT trainers have developed a very realistic 'capstone' exercise at the end of training which well prepares the teams to deploy. On the other hand, the Canadians have a very solid negotiation training program which includes much training and practice for all team members, but one that would be improved with practice in a challenging role-play scenario, reflecting a realistic Afghani cultural environment."
Air University (U.S.). Air Command and Staff College
Ericson, Charles B.
2008-04
-
Troubled Waters: Water and the Israeli-Palestinian Dilemma
From the thesis abstract: "It has been more than 40 years since the Israelis first gained control of the West Bank and Gaza Strip. During those years numerous attempts have been made to develop an acceptable solution to the Israeli-Palestinian Conflict, one which grants the Palestinians a sovereign homeland and offers reasonable assurance of Israeli security. The past 20 years have seen progress towards Palestinian autonomy, most visibly the handing over of the Gaza Strip to Palestinian control, however Israel has continued to maintain a tight rein on the West Bank. Images of terrorist bombings and tires burning in the streets dominate media coverage along with storylines explaining the security reasons for maintaining control over the West Bank. There is, however, a more basic element complicating the issue of an Israeli withdrawal and achieving a two-state solution, an element that does not receive flashy media attention but lies at the core of the conflict nearly as much as guaranteeing security. That complicating element is control over water. Israel receives nearly 100 percent of its consumable water from only three primary sources in the region: Lake Kinneret, the Coastal Aquifer, and the Mountain Aquifer. The issue complicating a Palestinian-Israeli two state solution is that the Mountain Aquifer, the most pristine water source of the three, lies primarily under the West Bank. Israel currently receives more than 30 percent of its freshwater from the Mountain Aquifer which it would have to share with any new Palestinian state. This research project explores the importance of control of the Mountain Aquifer to Israel, its relationship to control of the West Bank, and the impact of current Israeli water control practices on Palestinian development."
Air University (U.S.). Air Command and Staff College
Eberling, Brian Anthony
2009-04
-
Remotely Piloted Aircraft: An Integrated Domestic Disaster Relief Plan
From the Abstract: "How should government agencies integrate remotely piloted aircraft (RPA) into emergency response plans in support of relief efforts following a major disaster? […] The Department of Defense (DOD) should coordinate with the Federal Aviation Administration (FAA) and Federal Emergency Management Agency (FEMA) to integrate its RPAs into incident management plans in support of domestic disaster relief efforts. Some DOD agencies have developed concepts of operations and employment for defense support of civil authorities (DSCA). Based on a presidential directive in mid-2011, FEMA is reassessing its disaster response system by rewriting its doctrine and developing a full-spectrum preparedness program. With Congress's approval of the FAA Modernization and Reform Act of 2012, the FAA is not only funded, but also energized to substantially improve its efforts to integrate RPAs into the national airspace system (NAS). All these efforts present a critical window of opportunity where agencies should capitalize to integrate RPAs into the NAS, even if only temporarily. First, FEMA should integrate RPA support into its incident management systems, be familiar with their contributions, and be able to interoperate with them during a major disaster response. Furthermore, the FAA should establish RPA deconfliction procedures for immediate and temporary use in a disaster-stricken area. Finally, DOD crews should be trained to successfully complete the mission of supporting civil agencies in any domestic disaster response. These activities combine to ensure that the most capable assets are employed to effectively react to national emergencies."
Air University (U.S.). Air Command and Staff College
Totten, Lindsay
-
Constitutionality and Legality of NSA Surveillance Program
From the thesis: "When the Bill of Rights was crafted by our Founding Fathers, they felt impelled to include the Fourth Amendment to protect American citizens from 'unreasonable search and seizures' unless 'probable cause' was justified and a warrant issued. As politics, public opinion and technology evolved over the next two hundred years, the interpretation of the Fourth Amendment has also evolved and been continuously debated by Americans and all three branches of the government. Recently, the top-secret surveillance programs of the National Security Agency (NSA) has again brought the constitutional protections of the Fourth Amendment to the forefront of national debate. At the heart is the battle between protecting civil liberties while enhancing the security of the United States against foreign and domestic enemies, particularly terrorists. Fueling that battle are different perspectives of what constitutes privacy and what limitations, if any, should be placed on the government's collection capabilities. Currently, there is no amendment or law forbidding the surveillance of foreign governments, institutions or individuals. However, the constitutionality of NSA surveillance programs collecting on American citizens associated with our enemies comes into question. Despite the bad press the NSA has received lately, the surveillance programs do not violate the principles or intent of the Fourth Amendment, however, the United States government needs to introduce more transparency to quell its critics and provide peace of mind to Americans."
Air University (U.S.). Air Command and Staff College
Brandt, Bradley L.
2013-12
-
Military Culture and Counterinsurgency in the Twenty First Century: Defeating Boko Haram in Nigeria
From the thesis abstract: "From the advent of conventional military forces, engaging in 'set piece' battles against themselves, large armies have generally abhorred unconventional fights. Following WWII, the dismal performance of powerful military forces against relatively inferior irregular foes has been a subject of debate among military theorists. The objective of this paper is to show how military cultures have influenced the performance of conventional forces in irregular warfare. It exploits how conventional militaries can best adapt to the changing nature of warfare in the twenty-first century, by applying lessons learnt from centuries of irregular warfare. With recent upsurge in activities of terrorists' organizations such as Al-Qaida, Al-Shabaab and Boko Haram in sub-Saharan Africa, there is increasing focus on this region. Particularly, Nigeria is of vital interest to the United States, being a regional power in the continent as well as one of the largest suppliers of petroleum to the United States. This paper utilizes the historical development of conventional forces to explain their predisposition to conventional fights. Furthermore, it exploits the fundamental differences between conventional and irregular warfare, as well as the nature of modern international terrorism. The paper concludes by recommending strategy for combating Boko Haram in Nigeria, while considering terrorism in the region is intrinsically linked with socio-economic challenges in the region."
Air University (U.S.). Air Command and Staff College
Komolafe, Adedoyin A.
2013-04
-
Future Enablers: Air Force Smart Weapons in the 2040s
From the thesis abstract: "The Air Force will face many challenges over the next thirty years as it confronts budgetary limitations, increased costs, and heightened threats. The Air Force budget is likely to decrease. More of the Air Force budget will be allocated to pay for increasing personnel, maintenance, and operational costs. New weapon platforms will continue to be expensive and difficult to develop. This paper will explore these issues and examine the potential use of smart, stand-off weapons to address future Air Force problems and requirements. Future stand-off weapons could allow the Air Force to pivot away from increasingly complex and costly weapons platforms. Compared to weapons platforms, stand-off weapons potentially offer faster development times, reduced costs, better value, and advanced capabilities. This paper will recommend that smart, stand-off weapons should play an important role in addressing future Air Force challenges while allowing it to maintain its combat effectiveness."
Air University (U.S.). Air Command and Staff College
Ihlenfeld, Matthew J.
2013-04
-
Acquisition Dominance: Why the Make-Buy Decision and Decentralization Are Essential for DOD's Information Technology Acquisitions and Operations
From the thesis abstract: "This paper argues that if the Department of Defense (DOD) wants to provide the operational adaptability necessary for relevant cyber operations, then it needs decentralized capacity to organically acquire those capabilities. Towards that purpose this paper provides an intellectual basis for a paradigmatic shift in how the DOD acquires its information technology (IT). The proposed shift is to a construct that utilizes more organic means, including DOD personnel and direct contracted support, to develop, test, and sustain its capabilities rather than through intermediaries as is currently the norm. Such shifts must necessarily start small, building upon merit as theory becomes practice. This paper highlights that the DOD does not perform a 'make-buy' decision in its acquisition of capabilities as part of the Defense Acquisition System and that if it did, then the DOD would 'make' much of its information technology based on philosophical, capability, and financial justifications. A broad historical summary of acquisition is provided to highlight how certain macro-environmental factors have driven acquisition to exist in its current form with the implication that many of those environmental factors have paradigmatically changed, warranting a corresponding shift in the DOD acquisition approach. Because no strategy is worthwhile that cannot be implemented, a number of risk and implementation considerations are discussed."
Air University (U.S.). Air Command and Staff College
McAfee, John S.
2013-04
-
German Bundeswehr in the Face of a Changing Security Environment: A Study of Adaptation, Culture, and Politicization
From the thesis abstract: "In 2006, Germany released a new security policy to address the emergence of 'new risks and threats' with a modernized force capable of 'adapting to the dynamic security environment' and conducting operations beyond its borders. Germany has since risen to become a key player in the North Atlantic Treaty Organization (NATO) and the European Union (EU); however, security challenges from domestic terrorism, Russian expansionism, and a reduced US presence in Europe have also increased. This paper asserts that the Bundeswehr is inadequate to counter the current and growing security threats due to German culture and politicization. It substantiates this claim based on the results of a model that was synthesized from two organizational theoretical approaches that examined the Bundeswehr and how well it is adapted compared to the regional and global security environment. Secondly, it describes why culture and politicization is a significant contributing factor to these shortfalls. It should be recognized this paper only identifies inadequacies and their underlying causes through the lens of the organizational theory. It is not inclusive of all the problems facing the Bundeswehr and should be viewed as a starting point to recognizing and understanding the deep complications of it adapting to meet the challenges of the evolving security environment."
Air University (U.S.). Air Command and Staff College
Place, Thomas B.
2015-04
-
Revitalization of Nuclear Powered Flight
"There has been a lot of talk about the need to develop the third offset, of which human-machine integration seems to have dominated the conversation. The only problem is that our machines are no good unless they have power. Power to fly and run the sensors and weapons the mission requires. Machines for the USAF [United States Air Force] come in the form of airplanes, which cannot get to the fight without tanker support or stay in the air for a sufficient time. As the USAF looks to the future, it continues to invest heavily in tanker support and operations that are both expensive and not conducive to surviving in a denied environment. We must develop better ways to get our assets to the fight and maintain flight for longer periods of time. I believe one potential solution is to reinvest in nuclear powered flight. The technical challenges seen in the 1950s & 60s could be overcome with today's technology, we just need to set the goal. The ramifications of successfully developing a nuclear propulsion system go far beyond just a military advantage and would serve to revolutionize the way humans travel. This paper takes aim at the feasibility of nuclear powered flight today, along with identifying potential risks and recommendations."
Air University (U.S.). Air Command and Staff College
Dawson, Todd C.
2016-05-01
-
US-Nigerian Military Cooperation: US AFRICOM as a Mentor for Nigeria's Military Efforts at Promoting Respect for Human Rights
"The Nigerian military performs police duties whenever internal security crises escalate beyond the capabilities of the Nigerian police and this brings it in frequent contact with the civil populace, and this results in incessant allegations of human rights abuses. The effort Nigerian military leadership at stemming this trend has not yielded the desired outcome, and human rights organizations continue to publish reports of human rights violation against Nigeria military. This is worrying, because it does not only effect civil-military relations in Nigeria, but also negatively impact its relations with the United States (US) and other allies. The need for external support for Nigeria military personnel on how to approach human rights issues therefore becomes imperative. This essay therefore emphases how the US African Command (US AFRICOM) could support the Nigerian government's efforts to reduce incidents of human rights abuse by its security personnel."
Air University (U.S.). Air Command and Staff College
Imam, Mohammed A.
2016-06-01
-
Defeating ISIS by Winning the War of Ideas
From the research report introduction: "The United States and its coalition partners have struggled to defeat the Islamic State of Iraq and Syria (ISIS). After spending $11 billion executing almost three years of U.S. military operations against ISIS, the violent extremist organization continues to successfully drive effective attacks in Iraq, Syria, and the rest of the world. Specifically, and most importantly to its cause, ISIS continues to galvanize recruits and inspire lone wolf attacks. ISIS is able to recruit and inspire because it effectively convinces war-torn citizens, marginalized Muslims, and other solidarity seekers that its ideas and cause are just. Its ideas enables its fight. As such, defeating ISIS means defeating their ideas, especially in the eyes of vulnerable target audiences. [...] To develop the proposed recommended solution, research included reviewing published literature, scouring primary sources including ISIS propaganda magazines and videos, and analyzing media reports on ISIS activities. This research demonstrated the need to understand ISIS's historical context, frame the problem faced by the U.S., develop a moderate message by working with appropriate Muslim leaders and states, and to counter the ISIS propaganda machine. This approach leads to a two-part strategy for defeating ISIS by deterring and degrading recruitment, support, and loyalty to the Islamic State's cause."
Air University (U.S.). Air Command and Staff College
Siame, Lyson; Boyer, Raymond; Diaz, Henry . . .
2017-03-17
-
RQ-2 Pioneer: The Flawed System That Redefined US Unmanned Aviation
From the thesis abstract: "One of the greatest challenges military commanders face in the planning and execution of warfare is minimizing the fog of war. That gray area in which there is a knowledge gap of what the adversary is going to do at a given time or place, or how ones‟ own forces will react to a given scenario during a campaign. The great military strategist Carl Von Clausewitz, in his work 'On War,' described this phenomenon as an uncertainty that is present in three quarters of the factors on which action in war is based, and as such results in war being a realm of chances.1 In an effort to mitigate this uncertainty, commanders have historically relied on intelligence collection as one of the primary means for establishing better battlefield situation awareness. Through intelligence collection, commanders can gain a wealth of information to include: disposition of enemy forces, enemy force activity, indications and warning of impending enemy attack, terrain analyses, and battle damage assessments (BDA) after attack operations have occurred. Although the battlefield of the twenty-first century includes an extensive array of intelligence, surveillance and reconnaissance (ISR) capabilities ranging from national space based systems, to theater level collection aircraft and human intelligence sources, the remotely piloted aircraft (RPA) is currently king."
Air University (U.S.). Air Command and Staff College
Major, Richard
2012-02