Advanced search Help
Searching for terms: EXACT: "Air University (U.S.). Press" in: publisher
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Cracks in the Jihad
"Get ready for all Muslims to join the holy war against you,' the jihadi leader Abd el-Kader warned his Western enemies. The year was 1839, and nine years into France's occupation of Algeria the resistance had grown self-confident. Only weeks earlier, Arab fighters had wiped out a convoy of 30 French soldiers en route from Boufarik to Oued-el-Alèg. Insurgent attacks on the slow-moving French columns were steadily increasing, and the army's fortified blockhouses in the Atlas Mountains were under frequent assault. Paris pinned its hopes on an energetic general who had already served a successful tour in Algeria, Thomas-Robert Bugeaud. In January 1840, shortly before leaving to take command in Algiers, he addressed the French Chamber of Deputies: 'In Eu¬rope, gentlemen, we don't just make war against armies; we make war against interests.' The key to victory in European wars, he explained, was to penetrate the enemy country's interior. Seize the centers of population, commerce, and industry, 'and soon the interests are forced to capitulate.' Not so at the foot of the Atlas, he conceded. Instead, he would focus the army's effort on the tribal population."
Air University (U.S.). Press
Rid, Thomas
2010
-
National Security Acquisition Challenges
"The national security environment for the United States, and most other nations, in the coming years will experience a period of dramatic change. These changes have created urgency for transformation within the defense establishment--most particularly in acquisition. Specifically, three forces are driving this need for change: budgetary challenges, changing security requirements, and a changed military environment. The United States faces several long-term budgetary challenges, and the impact they will have on the domestic economy will directly contribute to the ability of the DoD to modernize and transform for the twenty-first century. Since 9/11 the US defense budget has skyrocketed, reaching around $700 billion in 2010, including 'supplementals.' Perhaps most important will be the projected rapidly increasing mandatory spending on programs such as Social Security and Medicare as baby boomers age."
Air University (U.S.). Press
Gansler, Jacques S.; Lucyshyn, William
2010
-
Airpower Lessons for an Air Force Cyber-Power Targeting Theory
"In this work, I examine historical targeting theories for airpower and their effects on the organizational, training, and equipping functions of the US Air Force. This analysis is intended to develop lessons learned in order to focus on the USAF cyber power organizational, training, and equipping functions. Just as early theorists conceptualized the use of airpower, so must contemporary USAF theorists develop a cyber-power targeting theory to apply in future wars. Following World War I, airmen at the Air Corps Tactical School (ACTS) developed an 'industrial web theory' for targeting to achieve victory through airpower. This theory informed senior-leadership decisions regarding organizational, training, and equipping functions for the USAF throughout its use. The targeting theory was employed with mixed results from World War II through the Vietnam War. In the late twentieth century, Col John Warden conceptualized and validated an airpower targeting theory based upon a concept of the enemy as a system. This model earned its success in Operation Desert Storm and is continually used in doctrine, education and training, and planning today. Although the Air Force went to war with the force it had in the early 1990s, Colonel Warden's theory informs organizational, training, and equipping decisions for senior leaders today. A USAF cyber-power targeting theory should consider lessons learned by early airpower theorists and practitioners. Just as Airmen attempted to influence the third war-fighting domain during airpower's infancy and maturation, Airmen are attempting to influence the fifth war-fighting domain of cyberspace today."
Air University (U.S.). Press
Anderson, Steven J., 1970-
2016-09
-
Human Side of Cyber Conflict: Organizing, Training, and Equipping the Air Force Cyber Workforce
"On 18 March 2013, the chief of staff of the Air Force tasked the Air Force Research Institute (AFRI) to review the training and development of the USAF cyber forces to take stock of current Air Force cyber force development. AFRI was to determine whether structural changes were required to ensure the successful organizing, training, and equipping of the Air Force's cyber workforce. This study is the culmination of research AFRI conducted to examine the USAF's cyber human capital planning and management strategies and to recommend improvements where needed. The goal of this study was to examine how we should recruit, educate, train, and develop cyber operators from the time they are potential accessions until they become senior leaders in the enlisted and officer corps."
Air University (U.S.). Press
Yannakogeorgos, Panayotis A.; Geis, John P., II
2016-06
-
Sharing Success- Owning Failure: Preparing to Command in the Twenty-First Century Air Force
"The single most important element of success in war is leadership. Leaders inspire others to achieve 'above and beyond.' The expectations of both leader and follower play key roles in the development of leadership, as do the leader's vision, the working environment, and the example established by the leader. The squadron commander is essential to accomplishing the mission of the United States Air Force. He or she must ensure that justice prevails among and between those commanded, and he or she must establish programs that promote health and happiness among the families within the command."
Air University (U.S.). Press
Goldfein, David L., 1959-
2001-10
-
Social Media: The Fastest Growing Vulnerability to the Air Force Mission
"Social media is the fastest growing vulnerability to the military mission and the personal security of all Airmen. On 30 November 2014, the FBI issued warning to members of the US military and requested that they review their social media presence for any information like names and addresses that might attract the attention of violent ISIS extremists. Over the past decade, the convergence of mobile broadband devices has enabled social media to become more and more integrated into our everyday lives. The inherent risks and vulnerabilities of the internet and social networking sites like Facebook,
LinkedIn, and Twitter along with the Air Force's endorsement to actively use social media, has cultivated a rich and ripe environment for foreign adversaries and criminals to cherry-pick personal information about Airmen and their missions for nefarious activities. To help Americans understand the risks that come with being online, the Department of Homeland Security launched a new cybersecurity awareness campaign: Stop, Think, and Connect. To educate Airmen on social media, AF public affairs created the 'Air Force Social Media Guide' in 2013 to encourage Airmen to share their AF [Air Force] experiences with family and friends in the social media environment. However, this is counter to the FBI's guidance that promotes the reduction of users' on-line footprint and online presence in cyberspace."
Air University (U.S.). Press
Solomon, Scott E., 1966-
2017-01
-
Green Eyeshades of War: An Examination of Financial Management During War
"In this evolving world environment that many believe will spawn more frequent and increasingly expensive military operations, I predict that the battle cry will not be victory at any cost, as it was in World War II. To the contrary, this new world order will demand victory at the most efficient and most economical cost. In this new world order, full financial support for contingencies is not a given. In fact, getting the funds necessary to win our nation's wars depends upon our military having the confidence of Congress and the American people that military financial managers can and will effectively and efficiently execute those funds during times of conflict. The question is, are we up to the task? This monograph will put military financial management during war on trial, examining fiscal performance and readiness during various conflicts: World War II, Vietnam, Operations Desert Shield/Storm, and Operations Enduring Freedom/Iraqi Freedom. Each of these conflicts is unique, yet each situation validated the critical need for sound fiscal management and controls. Let the trial begin."
Air University (U.S.). Press
Spencer, Larry O., 1953-
2016-07
-
Shaping Air Mobility Forces for Future Relevance
"This report asks whether the national air mobility system (NAMS) of the United States will or will not be able to accomplish its full spread of mission responsibilities in an uncertain future fraught with emerging challenges and threats. More specifically, this report will examine operational, institutional, doctrinal, and technological trends shaping a useful answer to that question. That answer will recognize the unequalled readiness of the NAMS for future wars and conflicts while also identifying some of its more troubling shortfalls in specific task areas. In the end, this study will identify opportunities to mitigate those shortfalls in the near term and without breaking the defense budget, and it will propose some initial steps along a path to further reducing or even eliminating them over the longer term. Accordingly, this report proceeds in four sections. It begins with a brief discussion of some of the more influential and enduring contextual elements of air mobility policy-namely structure, mission, and technology. It describes some emerging challenges to the nation's ability to conduct global air mobility operations effectively. It then discusses shortfalls in the current program of record fleet's ability to address those challenges and ends by identifying near- and longer-term opportunities to make things better in a 'challenging fiscal environment.'"
Air University (U.S.). Press
Owen, Robert C., 1951-
2017-01
-
Future of Remotely Piloted Aircraft in Special Operations: Methods to Improve AFSOC MQ-9 Effectiveness for Supporting Special Operations
"Unmanned aerial vehicles' support to US special operations forces has grown throughout the conflicts in Afghanistan and Iraq to find, fix, and finish high-value targets in numerous terrorist networks. As conflicts continue to evolve across multiple new theaters in new environments and countries, several limitations with the MQ-9 and its support network generated the question 'How might Air Force Special Operations Command (AFSOC) MQ-9s be improved to better support special operations teams around the world?' The report utilized a problem/solution framework, with examples presented in scenario vignettes to provide context to the current capabilities and limitations of the MQ-9. The resulting research identified solutions, including several hardware and software upgrades that improve communication, navigation, deconfliction, and weapons employment capabilities of the aircraft. Specifically, adding a second airborne radio, a flight management system (FMS) with certified global positioning system (GPS) navigation and a traffic collision avoidance system (TCAS) or an equivalent system will provide safer and more effective flight into the US National Airspace System (NAS) as well as International Civil Aviation Organization (ICAO) airspace. Secondly, the requirement to quickly adapt new and more weapons to support ground teams would be solved by rapidly incorporating the Universal Armament Interface as well as weaponinzing the outer stations of the MQ-9's external stores. Finally, the research highlighted the need for the preemptive emplacement of subject matter experts, in addition to the liaison officers already in place, to train with special operations teams and units stateside before they are tasked with an operation. These changes will enhance current and future support to special operations and even conventional US military forces in every theater to come."
Air University (U.S.). Press
Kowalski, Jordan
2017-09
-
Cyberdeterrence Between Nation-States: Plausible Strategy or a Pipe Dream?
From the article: "This article examines the plausibility of potential US strategies for deterring such strategic cyber offensives, both during and outside of open war. We first study the characteristics of classical deterrence theory to derive the prerequisites for fielding a credible cyberdeterrent. We next explore the severe challenges decision makers face in attempting to attribute cyber attacks to other nation-states. We then look at where punitive cyberdeterrence thresholds might lie, how these would need to be coordinated with US nuclear and conventional military deterrence postures and assess the numerous efficacy questions surrounding punitive cyberdeterrence. Lastly, we suggest how cyberdeterrence by denial may actually be the stronger and more credible strategic path for the United States. We do not examine questions of extended deterrence or deterring non-state-sponsored substate actors due to the substantially greater complexity of these issues. While these are valid questions for deterrence policy, their exploration is deferred for future analysis."
Air University (U.S.). Press
Solomon, Jonathan
2011
-
Instructor Experiences in Traditional, Online, and Hybrid Continuing Education Courses: A Case Study
From the Abstract: "Instructors of military continuing education courses transitioned two traditional classroom leadership courses to fully online and hybrid formats that combine online and face-to-face instruction. No evaluation of instructor experiences during the transition was conducted using research-based practices. The purpose of this qualitative study was to examine instructor experiences during the course transitions using research-based practices. This study was grounded in Malcolm S. Knowles, Elwood F. Holton III, and Richard A. Swanson's adult learning theory and Terry Anderson's and Gilly Salmon's online learning theories. Data from interviews with four instructors who taught the courses were examined using axial coding and thematic analysis. Three emergent themes were found that spanned all of the categories examined and the responses of all instructor participants. The first emergent theme pertained to the lengthy time it took to design online and hybrid versions of the traditional courses. The second emergent theme addressed the challenging task of creating a comparable level of interaction with students in an online setting. The lack of sufficient professional development emerged as a third theme. The findings of this study would suggest traditional courses could be transitioned from traditional to online and hybrid delivery with particular attention to allowing sufficient time for course redesign, incorporating interactive online teaching strategies, and providing robust professional development for new online instructors. This endeavor may contribute to positive social change by equipping online instructors to provide more learning opportunities for the military and civilians serving abroad."
Air University (U.S.). Press
Goerke, Leah Flores, 1964-
2019-06
-
Artificial Intelligence, Russia, China, and the Global Order
From the Series Preface: "The volume presented here is an exceptional example of a focused study from academics and active practitioners representing both civilian and military institutions. With changing security issues present on the global landscape, the work of the many collaborators within provides information that is imperative to our understanding of new threats and opportunities. Couple this with the ever-expansive role of technology embodied in artificial intelligence (AI), and the rationale to review the vital discussions in this paper is evident."
Air University (U.S.). Press
Wright, Nicholas D.
2019-10
-
Military Negotiation as Meta-Leadership: Engage and Align for Mission Success
From the Abstract: "This paper proposes a need for negotiation as an engaged leadership competency throughout the military. The paper speaks to the unique aspects of negotiation and conflict resolution in both benign and hostile military environments. When taking into consideration the economics of defense, negotiation provides leaders with standard grammar and processes by which to reduce the costs associated with decision-making and joint problem-solving. Discussed are strategies for operationalizing negotiation at tactical, operational, and strategic levels."
Air University (U.S.). Press
Matyók, Thomas G.
2019-09
-
Command of the Air
From the Editor's Preface: "This 2019 hardcover edition of 'The Command of the Air' supports Air University, where softcover copies of this resource have been issued to so many generations of students that the bindings were literally falling apart. 'The Command of the Air' actually is the title of Book I presented herein, 'Il dominio dell'aria,' first published in Italy in 1921. Almost from the time of the first translations of Douhet's writings, several other of his seminal pieces ('The Probable Aspects of the War of the Future,' 'Recapitulation,' and 'The War of 19--') were assembled as a collection under the familiar title of his most famous work. This edition improves on the 1942 version released by Coward-McCann Inc., New York, correcting and smoothing the Italian-to-English translation by Dino Ferrari by referring to the original Italian language from 'Il dominio dell'aria's' second printing in 1927. Footnotes marked 'Tr.' are from Ferrari; all other footnotes in 'The Command of the Air' are from Douhet."
Air University (U.S.). Press
Douhet, Giulio, 1869-1930
2019-09
-
Diverging Objectives: Maintaining Strategic Stability with Russia While Expanding Global Missile Defense
From the Abstract: "Since the US left the ABM [Anti-Ballistic Missile] Treaty in 2002, the prevailing assumption has been that Russia's consistent concerns with the limited US ballistic missile defense (BMD) system was political bluster, because its nuclear deterrent was large enough to easily defeat any US defenses. Previous studies generally based their arguments on a faulty understanding of Moscow's deterrence requirements, assuming it would accept a minimum deterrence standard of only a few warheads surviving to detonation. The following study shows that Moscow desires a credible threat of unacceptable damage to deter the United States and that an expanding US ballistic missile defense (BMD) system could prevent Russia from achieving this criterion and ultimately degrade bilateral strategic stability. The analysis uses a scenario planning framework to compare four future scenarios of US BMD versus Russia's nuclear deterrent. These comparisons demonstrate that unchecked expansion of the US missile defense system, especially when combined with future arms limitations, will cause legitimate concern in Russia over its ability to deter the United States during a crisis. Moscow's reduced confidence will continue to compel it to find new capabilities to penetrate and circumvent missile defense in order to restore balance, degrading arms race stability between the United States and Russia. Any further BMD expansion will further degrade strategic stability and put at risk future arms control agreements."
Air University (U.S.). Press
Russell, Shawn A.
2021-04
-
Journal of Indo-Pacific Affairs (Vol.3 No.5) [Special Issue: Quad Plus]
This 2020 "Quad Plus" special edition of the Journal of Indo-Pacific Affairs contains the following articles: "Quad Plus" by Jagannath Panda; "'Sea Foam in the Ocean' or an 'Asian NATO'?" by Jeffrey Becker; "US-China Strategic Competition and Washington's Conception of Quad Plus" by Akriti Vasudeva; "Japan and the Quad Plus" by Hideshi Tokuchi; "A Quad Plus" by Miguel A. Hijar-Chiapa; "Whose Centrality?"; "Britain and the Quadrilateral" by John Hemmings and James Rogers; "South Korea's Perspective on Quad Plus and Evolving Indo-Pacific Security Architecture" by Kuyoun Chung; "Israel and Quad Plus" by Giuseppe Dentice; "France's Indo-Pacific Strategy and the Quad Plus" by Celine Pajon; "Quad-Plus?" by Stephen R. Nagy; "Brazil in the Quad Plus" by Dattesh Parulekar; "Russia and Quad Plus" by Anna Kireeva and Alexei Kupriyanov; "Indian Ocean Island States and the Quad Plus" by Nilanthi Samaranayake; " Connectivity and the Quad Powers: Revisiting History and Thought" by Lavanya Vemsani; "Realistic Expectations" by Amit Gupta; "The Middle East and the Quad Plus" by Brendon Cannon; and "Pakistan-Afghanistan-Iran Triangularity and the Quad Plus" by Kenta Aoki.
Air University (U.S.). Press
2020
-
Journal of Indo-Pacific Affairs: 'Indo-Pacific Perspectives' (December 2020)
This issue of Indo-Pacific Perspectives from the Journal of Indo-Pacific Affairs features the following articles: "Introduction A Rules-Based Order for the Indo-Pacific?" by Peter Harris; "The Indian Ocean's Key Role in the Indo-Pacific Rules-based International Order" by Nilanthi Samaranayake; "Chinese Vision of a Rules-based Order: International Order with Chinese Characteristics" by Benjamin Tze Ern Ho; "Do Regimes Matter? Implications of the 2016 UNCLOS [United Nations Convention on the law of Sea] South China Sea Ruling for a Rules-based order in the Indo-Pacific" by Laura Southgate; "Next Priorities for Japan's FOIP [Free and Open Indo-Pacific] Vision: The Quad, ASEAN [Association of Southeast Asian Nations], and Institutional Linkages in the Indo-Pacific" by Kei Koga; "India's Indo-Pacific Reckoning" by Titli Basu; "Challenges in Institutionalizing Rules-based Order in the Indo-Pacific: Defending or Reordering the Status Quo" by Dr. Ngaibiakching; and "A Rules-based Order in the Indo-Pacific : A View from Jakarta" by Dewi Fortuna Anwar.
Air University (U.S.). Press
2020-12
-
Defending Air Bases in an Age of Insurgency, Volume III: Integrated Base Defense Principles for Commanders
From the Webpage Description: "This third and final volume in the AU [Air University] Press monograph series Defending Air Bases in an Age of Insurgency provides concise principles designed to assist Air Force and Space Force commanders in better understanding their role in base defense to better protect their people, resources, and war-fighting assets. Volume I of this book was Air University Press's number one download in 2014; Volume II was released in 2019. Volume III distills lessons and recommendations from the preceding two volumes to provide commanders the most concise view of the issues and concepts at stake in fulfilling their base defense roles. This volume provides future wing, group, and squadron commanders and maturing Air Force and Space Force leaders some guiding principles through which they can better lead, protect, and secure their people, and air- and space power assets."
Air University (U.S.). Press
Caudill, Shannon W.; Rundquist, Erik K.; Tullos, Andrea D.
2021-03
-
Journal of Indo-Pacific Affairs: 'Indo-Pacific Perspectives' (March 2021)
This March 2021 issue of Indo-Pacific Perspectives from the Journal of Indo-Pacific Affairs features the following articles: "Introduction: The Past, Present, and Future of Cross-Taiwan Strait Relations" by Peter Harris; "'Rock-solid': America's Past and Present Commitment to Taiwan" by Michael Mazza; "Taiwan's Security in the Emerging Indo-Pacific Order" by Sana Hashmi; "Irresistible Trend: The US-China Interest Asymmetry and Taiwan's Future" by Zuo Xiying; "Taiwan's Security: An Intertwined Knot" by Wu Shang-su; "An Interpretation of Xi's Taiwan Policy--and Taiwan's Response" by Hsiao-chuan Liao; and "Status Quo? What Status Quo?" by Jessica Drun.
Air University (U.S.). Press
2021-03
-
Air & Space Power Journal (Vol. 35, Issue 1)
This Spring 2021 edition of Air & Space Power Journal includes the following articles: "Black Space versus Blue Space: A Proposed Dichotomy of Future Space Operations" by Carl A. Poole, and Robert A. Bettinger; "Infrastructure Truths for Air, Space, and Cyberspace" by Joel A. Sloan, M. Scott Stanford, Thomas J. Phelan, and James B. Pocock; "Media Interaction Warfare Theory: A Novel Analytic Process Supporting Space Warfare Planning Operations" by Michael P. Scardera, and B. T. Cesul; "An Information Warfare Framework for the Department of Defense" by Andrew Caulk; "Is It Time to Forget about Cyber Deterrence?" by Cameron Ross; "Reframing Air Force Suicide Prevention: A Human Capital Strategy to Normalize Help-Seeking Behaviors" by Nicholas J. Mercurio; and 7 book reviews.
Air University (U.S.). Press
2021
-
Examining Space Warfare: Scenarios, Risks, and US Policy Implications
"Militaries plan for contingencies involving space, but few studies have examined the issue with the intent of helping guide policies necessary for shaping military planning. This article takes a practical approach by examining space warfare, beginning with current US political policy and military space doctrine. After examining how the United States intends to fight, the author addresses current fielded capabilities that exist to conduct these battles, both in the United States and in nations considered potential space opponents. Analyzing possible confrontations with space competitors, he concludes that realistic scenarios involving military confrontation in space are extremely limited and, as a corollary, that space weaponization is neither an efficient nor effective way to reduce US vulnerabilities. [...]. The simultaneous rise in the necessity and vulnerability of space assets led the 2001 Space Commission to warn of a potential space 'Pearl harbor'--a warning that confirmed the beliefs of those who seek increased militarization of space, including space-based weapons, to ensure the nation's security. Since that time, others have argued that the deployment of space-based weapons, at best, will lead to a destabilizing space-weapons race and, at worst, will result in the long-term, catastrophic contamination of highly useful regions of the space environment in a truly Pyrrhic defense of national interests. This article contends that the very concept of a space Pearl harbor conflicts with the reality of current space-warfare possibilities and that, contrary to the beliefs of 'space dominance' advocates, it is still possible to maintain space as a sanctuary while protecting US military capabilities."
Air University (U.S.). Press
Weston. Scott A.
2009-02
-
Emphasizing Effect over Domain: Merging Three Organizations to Enhance the Efficacy of Our Nation's Intelligence Production
"Dr. Tomme proposes a new split in the Air Force's organizational structure that deemphasizes the domain and stresses effects; this involves separating combat effects from combat-support effects for the best exploitation of these effects-based synergies. An Air Force Space Command combined with the new Air Force Intelligence, Surveillance, and Reconnaissance Agency would become the cornerstone of a new combat-support command that would enable a single commander to support joint Department of Defense operations and the intelligence community more effectively than is possible under the current structure. Such a new command could quickly become the nation's preeminent provider of high-ground command, control, communications, computers, intelligence, surveillance, and reconnaissance effects."
Air University (U.S.). Press
Tomme, Edward B. (Edward Brown), 1963-
2009-02
-
Wartime Alliances versus Coalition Warfare: How Institutional Structure Matters in the Multilateral Prosecution of Wars
"No one doubts that military alliances are highly consequential in shaping the landscape of international politics. States pursue alliances to preserve themselves in the face of threats or to augment their power. Once formed, military alliances send ripples through the system, shaping the patterns of interaction among states, and may alter the identity of politics among members. Because of the increased threat confronting nonmembers once an alliance is formed, it may alter future patterns of alignment or culminate in military hostilities. The most consequential realm of multilateral action is in the area of military operations, but scholars and policymakers think nothing of dismissing coalition operations as unilateral if one country takes the lead in decision making. This is problematic. Any multinational operation requires coordination in command and control and mutual cooperation in ideas and actions. The dynamics within coalitions and alliances are as important as the objectives they are designed to pursue. Alliance operations during wartime are fundamentally different from coalition operations. What follows is an analysis of these differences, including their formation, cohesiveness, and burden sharing. In many ways, states in coalitions focus principally on operational effectiveness, while political effectiveness becomes of primary concern in wartime alliances. Next, the argument is evaluated in the context of two cases: the first Gulf War coalition and NATO operations in Kosovo. Finally, an analysis of contemporary wars and policy recommendations is presented."
Air University (U.S.). Press
Weitsman, Patricia A.
2010
-
Washington's Newest Bogeyman: Debunking the Fear of Failed States
"The American foreign policy establishment has identified a new national security problem. Over the past two decades, foreign-policy scholars and popular writers have developed the ideas that 'failed states' present a global security threat, and that accordingly, powerful countries like the United States should 'fix' the failed states. However, the conventional wisdom is based on a sea of confusion, poor reasoning, and category errors. [...] This article calls into question the validity of the concept of failed states and highlights the consequences of integrating fear of failed states into American grand strategy. Four areas are considered. First, we outline the theoretical and historical ideas from which the concept of state failure emerged. Second, we provide evidence of growing concern on the part of US policymakers about state failure, including structural changes in the US national security bureaucracy that aim at remedying state failure. Third, we sketch out some of the methodological problems with the research on state failure, pointing out that the very term failed state carries little meaning and even less policy instruction. Finally, we outline the high costs and dubious benefits of a policy focused on state building."
Air University (U.S.). Press
Preble, Christopher A.; Logan, Justin
2010
-
Bush vs. Obama Detainee Policy Post-9/11: An Assessment
"The record of the Bush administration in the aftermath of 9/11 includes the overthrow of the Taliban regime in Afghanistan, the disruption of al-Qaeda's power infrastructure, and the capture or killing of some of the terrorist organization's worst actors. However, on balance, it also included a violation of international as well as domestic legal standards related to torture, subjecting alleged terrorist prisoners to arbitrary indefinite detention and inhumane and degrading treatment; creating secret CIA [Central Intelligence Agency]-run prisons abroad; using unlawful rendition; and employing extensive international and domestic warrantless surveillance without court supervision. As a result, the Bush administration adversely affected our relationship with other nation states and defeated the goal of reducing anti-American sentiment in the global arena. After a brief review of detainee policies in the Bush administration, this article will focus on Obama administration policies and to what extent they have continued or reversed Bush-era policies. Specifically, attention will be given to the following issue areas: closure of the Guantanamo Bay detention facility, the Military Commissions Acts of 2006 and 2007, and prolonged detention of suspected terrorists."
Air University (U.S.). Press
Cutler, Leonard
2010
-
Policy, Intelligence, and the Billion-Dollar Petroglyph
The pressure for corporate intelligence consensus is as great as the pressure for corporate policy consensus. The policy and intelligence processes are different but not separate. Intelligence is defined through analysis, and policy is defined through implementation. New policy can focus intelligence analysis, and new intelligence may influence policy changes. The relationship is dynamic, and exchanges are not necessarily sequential but invariably interactive. This interaction is not always harmonious; indeed, often it is a troubled road characterized by the need for reduction, the intrusion of bias, and the vagaries of a vast collection and processing subculture. Too often the policy/intelligence relationship, particularly in the defense establishment, is viewed idealistically, and this romantic view undermines the very process of effective interaction. Ideally, policy and intelligence are collegial partners in pursuit of larger national security goals. In practice, intelligence is somewhat of a junior partner with, what may be, a self-imposed image problem. Traditional suggestions for improving the quality of military intelligence support to the national security debate have focused on resource augmentation. Improved outcomes are inexorably, and often inexplicably, tied to more dollars and more sophisticated collection technology. This document discusses what would improve intelligence most in the defense arena. There are three shifts in emphasis that require little or no new resources: a better understanding of the corporate personality of policymakers; a recognition of the role that bias plays in policy formulation and intelligence analysis; and a change in the image of the intelligence process, coupled to an upgrade in the stature of intelligence managers.
Air University (U.S.). Press
Donovan, G. Murphy
1986
-
Information Operations: A New War-Fighting Capability
In its most basic form, commanders have always performed the functions of observe, orient, decide, and act (OODA Loop) to prosecute military operations. As with Alexander the Great, history shows the military commander who best analyzes, decides, and controls the speed of the engagement prevails in nearly every conflict. To master the OODA Loop, military leaders have pushed technology to obtain more information. Ironically, this situation now leads to the requirement to solve two fundamental challenges if the United States expects to maintain air and space dominance in 2025. First, the proliferation of un-integrated military war-fighting architectures gives the commander potentially conflicting perspectives of the battle space. Second, the explosion of available information creates an environment of mental overload leading to flawed decision making. Failure to master these challenges critically weakens the military instrument of power. This paper presents a solution to these challenges by confronting commanders as they employ future airpower forces.
Air University (U.S.). Press
Bethel, Scott A.; Osborne, William B.; Chew, Nolen R.
1996-08
-
Beating International Terrorism: An Action Strategy for Preemption and Punishment
The author finds US efforts against terrorism are blunted by bureaucratic infighting and turf battles. The question continues: Is terrorism a criminal act or an act of war? How we fight it depends on how that question is answered.
Air University (U.S.). Press
Sloan, Stephen
2000-04
-
Implications of Virtual Deception
Virtual Deception is the new warfare tactic coming of age, and is by far the most damaging warfare practice in the year 2025. The author defines Virtual Deception as follows: "the use of network communication/information system to shape the enemy's view of the battlefield by deliberately and explicitly altering, distorting, blocking, or destroying the real-time information processed in the enemy's imaging and sensor systems with the intent of deceiving the enemy to behave in a predetermined manner, and thus indirectly control the enemy's actions." Since the turn of the century technology has advanced at a mind-numbing rate. Technology such as bi-static sensors, 3-D holographic DNA storage, and artificial omnisensory sensors developed during the early twenty hundreds have enabled the standard 3-D Multi-Spectral/Omnisensoral imaging systems present in 2025. In addition, the civilian sector development and perfection of real-time video insertion and terahertz communications system increased the speed of the decision making process dramatically. The predictions of the destabilization of the global community were correct, and all conflicts in 2025 are limited in duration, involve coalitions, and aim at restoring regional stability. Due to the explosion of information gathering and processing systems, almost anyone can participate in shaping the global environment. However, the inability to place restraints on access to the global community is still a serious weakness.
Air University (U.S.). Press
Pasanen, York W.
1999-04-15
-
Building a BattleSpace Wide Web
As Operation Allied Force progressed and mission planning experience at Whiteman AFB grew, B-2 bomber crews gained "real time" appreciation for the paths information takes as it moves from sensor to shooter. Quickly it became apparent that all warfighting systems must be able to plug into a common battle-space picture, or Battlespace Wide Web (BWW). As the information battle moves to center stage in the 21st Century, the challenge for a fighting force rests in linking information during combat operations from all combat platforms, synthesizing it, and providing it to a BWW for all the users.
Air University (U.S.). Press
Colella, Robert A.
2001-10-10