HomeAU PressArticles
Air University Press Banner

Air University Press Article Search

AU Press Articles

  • Jungle Skippers: The 317th Troop Carrier Group in the Southwest Pacific and Their Legacy

    This study examines the 317th Troop Carrier Group’s experience in the southwest Pacific during World War II to identify its long-term effects. The work focuses on the 317th's role in two specific events, the Battle of Wau in January 1943, and the airborne assault at Nadzab the following September. Each event highlights the combat airlift dichotomy of airland and airdrop. In airland, troops are moved by aircraft and disembark from the aircraft on the ground. In airdrop, troops are moved by aircraft and landed using parachutes. [Maj John D. Poole, USAF / 2017 / 107 pages/ ISBN: 9781585662708 / P-115] Read This Paper Now
  • Adapt or Fail: The USAF’s Role in Reconstituting the Iraqi Air Force, 2004–2007

    The US Air Force has not had much experience in helping to create an air force for a partner nation. Usually the partner nation would already have an air force and the requisite infrastructure, only needing better airplanes, more training, or additional spare parts for the equipment already on hand. In Iraq, however, the Coalition Provisional Authority (CPA) officially disbanded the country’s air force and the other branches of its armed forces. During the transitional period pending the formal return of sovereignty to the Iraqi people, the CPA re-created the national institutions deemed essential, including a defense force. A handful of USAF advisors deployed to help the Iraqis reconstitute their air force in January 2004. This book summarizes the essentials of that complex sequence of events. This is a story about the ingenuity, flexibility, and perseverance of the USAF Airman-advisors
  • The Achievable Multinational Cyber Treaty: Strengthening Our Nation’s Critical Infrastructure

    The Achievable Multinational Cyber Treaty: Strengthening Our Nation’s Critical Infrastructure Col Mark A. Barrera, USAF  Developing cyber norms and institutions has been problematic due to the competing interests of the major state actors in the multinational environment—especially among Russia, China, and the United States—concerning information freedom and access. The author establishes the genesis of this debate and argues that the United States should move beyond it to the issue of protecting critical infrastructure from cyber attack. Addressing the escalating threats to our nation’s infrastructure and networks, the author recommends pursuing an international agreement singularly focused on securing critical infrastructure combined with improving national regulatory and legislative measures for cyber defense. [2017 / 35 pages / ISBN 9781585662661 /
  • Social Media

    Social Media Lt Col Scott E. Solomon, USAF  The inherent risks and vulnerabilities of the Internet and social networking sites like Facebook, LinkedIn, and Twitter have cultivated a rich and ripe environment for foreign adversaries and criminals to cherry-pick personal information about Airmen and their missions for nefarious activities. FBI guidance encourages users to reduce their online footprint in cyberspace rather to proliferate it. This paper addresses some of the most common threats and vulnerabilities of the social media environment, the risks of using social media, and current Air Force social media guidance. It recommends revising Air Force social media guidance and outlines cyberspace best practices. An informed workforce can better protect the Air Force mission and reduce the risk of becoming a target of opportunity. [Lt Col Scott E.
  • Is Cyber Deterrence Possible?

    Is Cyber Deterrence Possible? Col Timothy M. McKenzie, USAF  Deterrence in the cyber domain is drastically different and far more complicated than in the other military domains of air, land, sea, and space. Cyber weapons and offensive cyber techniques are relatively inexpensive and easily obtained or developed. The number of adversary groups capable of attacking US networks is large, and our ability to deter each group will vary based on their motives and levels of risk tolerance. An effective cyber deterrence strategy must be multilayered and use all instruments of US national power. This paper explores the difficulties of deterring unwanted cyber activities, sets some realistic expectations for a deterrence strategy, and offers proposals to help mitigate the problems. [2017 / 33 pages ISBN: 9781585662739 / AU Press Code: CPP-4]
  • Resilient Effective Adaptable Leadership

    Adaptation is required to stay ahead of the competition or an adversary, remain relevant, or increase effectiveness. Military leaders must self-evaluate and confront any barriers inhibiting their growth in this area. Sawtelle provides opportunities to reflect on leadership in an uncommon context. Self-reflection—made more credible by a certain level of discomfort — can shed light on personal and cultural blind spots. There are six common blind spots in modern military culture inhibiting the comprehensive development of more advanced leaders to achieve resilient intent: trust, risk, investment of time, ownership, technology dependence, and personal adaptability. These elements can serve as catalysts for reflection and dialogue to aid in the evolution of modern leadership culture to best prepare for surprise, disruption, and crisis. [Jonathan D. Sawtelle / 2016 / 115 pages / ISBN:
  • On the Leadership Journey: 30 Conversations about Leading Yourself and Others

    These conversations represent Chief LugoSantiago’s boots-on-the-ground framework of leadership study and philosophy. Although tightly woven in timeless leadership tenets, this book is not about leadership acquired in the quietness of a classroom. What you find in his writing and leadership talks are proven answers in response to questions many people are asking about leading themselves and others. Regardless of your background—civilian, military, community organizer, or business leader—consider this book your personal leadership coach. [José A.LugoSantiago, CMSgt, USAF / 2016 / 110 pages / ISBN: 9781585662678 / Cost: $13 / AU Press Code: B-145] Read This Book Now
  • Air University Press Publications

    Air University Press Publications Air University Press  Describes currently offered Air University (AU) Press books, journals, research papers, AU texts, and audio books. AU Press is a not-for-profit publisher of air, space, and cyberspace power topics for the development, exchange, and advancement of airpower and national security thought critical to all Airmen. These publications are the result of unique research by military authors and civilian scholars. [Air University Press / 2016 / 118 pages/ ISBN 978-1-58566-171-8 / AU-3]
  • Airpower Lessons for an Air Force Cyber-Power Targeting Theory [ONLINE ONLY]

    Airpower Lessons for an Air Force Cyber-Power Targeting Theory Steven J. Anderson  Cyber targeting and associated doctrine should be the center of Air Force cyber strategy and its plans to organize, train, and equip a force for full-spectrum cyberspace operations. Understanding what targets cyber operations can affect is critical to deliberate planning or crisis planning. This paper attempts to draw parallels to early airpower targeting principles in order to propose a cyber-power targeting theory based on offense, defense, and exploitation objectives. It draws upon limited artifacts inherent to wielding cyber power—attribution, authorities, and centers of gravity—and acknowledges their impacts upon leaders and practitioners of cyber power. In addition to focusing on the adversary, the theory is intended to cause introspection toward the end of identifying potential Air Force and
  • Cyber Workforce Retention

    Cyber Workforce Retention Maj William E. Parker IV, USAF  The US Air Force must develop strategies to effectively retain and sustainably build its workforce of 1B4 cyber Airmen. Doing so will be most critical in the next few years as the Air Force continues to increase its contribution to the nation’s cyber mission forces. This study overviews the current cybersecurity human capital environment and explores the evolution of this new breed of warrior and the plan to move this emerging career field from growth to future sustainment. Also examined are public-sector retention study and initiative findings and Department of Defense retention tools—primarily special and incentive pays—for their potential application in supporting cyber Airmen retention. The study concludes with recommendations for initiatives and focus areas to support not only retention
RSS