HomeCyber CollegePublications



The Air Force Cyber College conducts research to lead in the generation and publication of a sufficiently rigorous and robust set of operational theory to guide problem formulation allowing Airmen to leverage the opportunities of new emerging computing and networking technologies while assuring missions against the vulnerabilities of adversary usage.

The College focuses on the research required to provide AF cyber community with cutting edge solutions to their problems. This research is an integral part of the graduate education at Air University for the AF workforce. The core engine that will drive the cyber/EW center are the faculty, student research, methodology and framework development and publications. 

Malicious cyber activity has become increasingly prevalent and sophisticated due to a confluence of social, technological, economic, and political forces. Although the U.S. government (USG) focuses on defending against attacks, efforts to deter attackers before they launch their attacks are often handicapped by the unique features of the cyber domain, such as the ability of attackers to maintain anonymity or pseudonymity.

Recent Publications

  US Policy Response to Cyber Attack on SCADA Systems Supporting Critical National Infrastructure
Maj Scott A. Weed, USAF

This study examines federal efforts to unify the public and private domestic sectors in the defense against cyber attack on the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that underpin US critical national infrastructure. It describes critical national infrastructure; the role of industrial control and SCADA systems in these sectors; and the panoply of actors, vulnerabilities, late-to-need cybersecurity, and threat trends for these systems. Political and social challenges to achieving greater cybersecurity are examined as are the processes through which the US government divides efforts among its lead cybersecurity agencies and what the responses to a cyber attack on ICS or SCADA might resemble.
  Is Cyber Deterrence Possible?
Col Timothy M. McKenzie, USAF

Deterrence in the cyber domain is drastically different and far more complicated than in the other military domains of air, land, sea, and space. Cyber weapons and offensive cyber techniques are relatively inexpensive and easily obtained or developed. The number of adversary groups capable of attacking US networks is large, and our ability to deter each group will vary based on their motives and levels of risk tolerance. An effective cyber deterrence strategy must be multilayered and use all instruments of US national power. This paper explores the difficulties of deterring unwanted cyber activities, sets some realistic expectations for a deterrence strategy, and offers proposals to help mitigate the problems.
  The Achievable Multinational Cyber Treaty Strengthening Our Nation’s Critical Infrastructure

Col Mark A. Barrera, USAF

Developing cyber norms and institutions has been problematic due to the competing interests of the major state actors in the multinational environment—especially among Russia, China, and the United States—concerning information freedom and access. The author establishes the genesis of this debate and argues that the United States should move beyond it to the issue of protecting critical infrastructure from cyber attack. Addressing the escalating threats to our nation’s infrastructure and networks, the author recommends pursuing an international agreement singularly focused on securing critical infrastructure combined with improving national regulatory and legislative measures for cyber defense.

  Social Media: The Fastest Growing Vulnerability to the Air Force Mission
Lt Col Scott E. Solomon, USAF

The inherent risks and vulnerabilities of the Internet and social networking sites like Facebook, LinkedIn, and Twitter have cultivated a rich and ripe environment for foreign adversaries and criminals to cherry-pick personal information about Airmen and their missions for nefarious activities. FBI guidance encourages users to reduce their online footprint in cyberspace rather to proliferate it. This paper addresses some of the most common threats and vulnerabilities of the social media environment, the risks of using social media, and current Air Force social media guidance. It recommends revising Air Force social media guidance and outlines cyberspace best practices. An informed workforce can better protect the Air Force mission and reduce the risk of becoming a target of opportunity.


Cyber Workforce Retention

Maj William E. Parker IV, USAF

The US Air Force must develop strategies to effectively retain and sustainably build its workforce of 1B4 cyber Airmen. Doing so will be most critical in the next few years as the Air Force continues to increase its contribution to the nation’s cyber mission forces. This study overviews the current cybersecurity human capital environment and explores the evolution of this new breed of warrior and the plan to move this emerging career field from growth to future sustainment. Also examined are public-sector retention study and initiative findings and Department of Defense retention tools—primarily special and incentive pays—for their potential application in supporting cyber Airmen retention. The study concludes with recommendations for initiatives and focus areas to support not only retention of cyber Airmen but also growth and sustainability of this fledgling career field.

Email List

* indicates required

AF Cyber College Social Media

Facebook Twitter
We are proud to be playing a role in the education of this new initiative through our #FMAC class. Looking forward… https://t.co/NFVpcXmNK6
RT @MSFRIC: The Air University Library has resumed normal hours starting today, 2 Jan 2018. Find more information about our hours online at…
RT @DarkReading: Toxic Data: How 'Deepfakes' Threaten Cybersecurity https://t.co/Qcumfv0gqR by @dikaheto #deepfakes
RT @AETCommand: Major change to the @usairforce Officer Training School is changing the paradigm for building officers, pivoting away from…
RT @RidT: This is big: at-scale, real-time, fully automated phishing attacks against SMS two-factor authenticated email accounts are finall…
We will be supporting the @505th_CCW as they prepare to execute a training course in support of the Air Force’s new… https://t.co/xiHyYGF4xN
The Air Force is reorganizing its primary IT shop https://t.co/cPceGcsVxL
RT @AF_Cyber: If you're a cyber, IT or HR professional, you can be part of @AFCyberWorx's upcoming Talent Management Design Sprint to help…
RT @AFCYBERCOLLEGE: Come Work With Us! We are hiring multiple faculty instructor and researcher positions. More info to be posted later. Yo…
RT @CyberStatecraft: Compete in our one of a kind #cyber policy competition! Registration is now open for the 7th annual #Cyber912 Strategy…
Reality #1: Bad guys already have access to personal data points... Reality #2: Any data point you share with a co… https://t.co/0kbGmICbvJ
Come Work With Us! We are hiring multiple faculty instructor and researcher positions. More info to be posted later… https://t.co/V8R1CgLipr
RT @usairforce: We join the nation and the Bush family in mourning the loss of our 41st #POTUS, George H.W. Bush. Godspeed, Mr. President.…
We are always glad to have you. https://t.co/wsIUW8CTjM
RT @NautilusMag: Depending on the speaker, lectures can be a joy, but, the efficacy of the lecture, as a teaching method, is in doubt. http…
RT @Joseph_Marks_: GSA plans to formalize its rule requiring contractors to report cyber incidents that affect confidentiality, integrity o…