Released on 2018-11-15Categories History

Flying with the Fifteenth Air Force

Flying with the Fifteenth Air Force

Author: Tom Faulkner

Publisher: University of North Texas Press

ISBN: 9781574417425

Category: History

Page: 264

View: 832

In 1944 and 1945, Tom Faulkner was a B-24 pilot flying out of San Giovanni airfield in Italy as a member of the 15th Air Force of the U.S. Army Air Forces. Only 19 years old when he completed his 28th and last mission, Tom was one of the youngest bomber pilots to serve in the U.S. Army Air Forces during World War II. Between September 1944 and the end of February 1945, he flew against targets in Hungary, Germany, Italy, Austria, and Yugoslavia. On Tom’s last mission against the marshalling yards at Augsburg, Germany, his plane was severely damaged, and he had to fly to Switzerland where he and his crew were interned. The 15th Air Force generally has been overshadowed by works on the 8th Air Force based in England. Faulkner’s memoir helps fill an important void by providing a first-hand account of a pilot and his crew during the waning months of the war, as well as a description of his experiences before his military service. David L. Snead has edited the memoir and provided annotations and corroboration for the various missions.
Released on 2018-12-20Categories History

Flight Accidents in the 21st Century U.S. Air Force

Flight Accidents in the 21st Century U.S. Air Force

Author: Henry Bond

Publisher: McFarland

ISBN: 9781476674025

Category: History

Page: 202

View: 882

Mid-flight noncombat mishaps and blunders occur frequently in the USAF during training and utility flights--sometimes with the loss of life and regularly with the destruction of expensive aircraft. In one extreme case, a $2.2 billion B-2 Spirit bomber crashed soon after takeoff and was destroyed. The events surrounding such accidents are gathered by USAF investigators and a report is published for each case. The author has collected these reports, including some made available following FOI (Freedom of Information) requests to U.S. air bases, and rewritten them in language accessible to the general public. The causes--bird-strikes, joy-riding, unauthorized maneuvers, pilot disorientation, an unseen binoculars-case blocking the plane's joystick, unexpected moisture in an air-pressure gauge--are often surprising and, at times, horrifying.
Released on 2016-11-25Categories Technology & Engineering

Owning the Technical Baseline for Acquisition Programs in the U.S. Air Force

Owning the Technical Baseline for Acquisition Programs in the U.S. Air Force

Author: National Academies of Sciences, Engineering, and Medicine

Publisher: National Academies Press

ISBN: 9780309449038

Category: Technology & Engineering

Page: 83

View: 172

While there are examples of successful weapon systems acquisition programs within the U.S. Air Force (USAF), many of the programs are still incurring cost growth, schedule delays, and performance problems. The USAF now faces serious challenges in acquiring and maintaining its weapons systems as it strives to maintain its current programs; add new capabilities to counter evolving threats; and reduce its overall program expenditures. Owning the technical baseline is a critical component of the Air Force's ability to regain and maintain acquisition excellence. Owning the technical baseline allows the government acquisition team to manage and respond knowledgeably and effectively to systems development, operations, and execution, thereby avoiding technical and other programmatic barriers to mission success. Additionally, owning the technical baseline ensures that government personnel understand the user requirements, why a particular design and its various features have been selected over competing designs, and what the options are to pursue alternative paths to the final product given unanticipated cost, schedule, and performance challenges. Owning the Technical Baseline for Acquisition Programs in the U.S. Air Force discusses the strategic value to the Air Force of owning the technical baseline and the risk of not owning it and highlights key aspects of how agencies other than the Air Force own the technical baseline for their acquisition programs. This report identifies specific barriers to owning the technical baseline for the Air Force and makes recommendations to help guide the Air Force in overcoming those barriers.
Released on 2019-08-09Categories Technology & Engineering

The Growing Threat to Air Force Mission-Critical Electronics

The Growing Threat to Air Force Mission-Critical Electronics

Author: National Academies of Sciences, Engineering, and Medicine

Publisher: National Academies Press

ISBN: 9780309493901

Category: Technology & Engineering

Page: 111

View: 871

High-performance electronics are key to the U.S. Air Force's (USAF's) ability to deliver lethal effects at the time and location of their choosing. Additionally, these electronic systems must be able to withstand not only the rigors of the battlefield but be able to perform the needed mission while under cyber and electronic warfare (EW) attack. This requires a high degree of assurance that they are both physically reliable and resistant to adversary actions throughout their life cycle from design to sustainment. In 2016, the National Academies of Sciences, Engineering, and Medicine convened a workshop titled Optimizing the Air Force Acquisition Strategy of Secure and Reliable Electronic Components, and released a summary of the workshop. This publication serves as a follow-on to provide recommendations to the USAF acquisition community.
Released on 2019-11-22Categories Reference

Operations - Command Posts (Air Force Material Command - Supplement) Air Force Manual 10-207

Operations - Command Posts (Air Force Material Command - Supplement) Air Force Manual 10-207

Author: U.S. Air Force

Publisher: Lulu.com

ISBN: 9781794761483

Category: Reference

Page: 104

View: 418

1.1.1. Command post operations furthers AFPD 10-25 guidance by serving as the focal point for Command and Control for commanders during routine operations, emergencies, contingencies, and increased readiness. The Command Post is a direct representative of the commander and serves as the sole agency responsible for executing Command Post-related Command and Control activities. 1.1.2. The installation Command Post is a wing staff agency organized directly under the wing function. Command Post Managers are tasked with the responsibility of operating the Command Post on behalf of the wing commander. As such, either the wing commander, vice wing commander, or Director of Staff will be the reporting official for the Chief, Command and Control Operations or Superintendent if there is no Chief assigned (T-2).
Released on 2017-02-06Categories Mathematics

Strengthening Data Science Methods for Department of Defense Personnel and Readiness Missions

Strengthening Data Science Methods for Department of Defense Personnel and Readiness Missions

Author: National Academies of Sciences, Engineering, and Medicine

Publisher: National Academies Press

ISBN: 9780309450812

Category: Mathematics

Page: 164

View: 189

The Office of the Under Secretary of Defense (Personnel & Readiness), referred to throughout this report as P&R, is responsible for the total force management of all Department of Defense (DoD) components including the recruitment, readiness, and retention of personnel. Its work and policies are supported by a number of organizations both within DoD, including the Defense Manpower Data Center (DMDC), and externally, including the federally funded research and development centers (FFRDCs) that work for DoD. P&R must be able to answer questions for the Secretary of Defense such as how to recruit people with an aptitude for and interest in various specialties and along particular career tracks and how to assess on an ongoing basis service members' career satisfaction and their ability to meet new challenges. P&R must also address larger-scale questions, such as how the current realignment of forces to the Asia-Pacific area and other regions will affect recruitment, readiness, and retention. While DoD makes use of large-scale data and mathematical analysis in intelligence, surveillance, reconnaissance, and elsewhereâ€"exploiting techniques such as complex network analysis, machine learning, streaming social media analysis, and anomaly detectionâ€"these skills and capabilities have not been applied as well to the personnel and readiness enterprise. Strengthening Data Science Methods for Department of Defense Personnel and Readiness Missions offers and roadmap and implementation plan for the integration of data analysis in support of decisions within the purview of P&R.
Released on 2020-04-30Categories Political Science

The Drone Age

The Drone Age

Author: Michael J. Boyle

Publisher: Oxford University Press

ISBN: 9780190635886

Category: Political Science

Page: 336

View: 764

In The Drone Age, Michael J. Boyle addresses some of the biggest questions surrounding the impact of drones on our world today and the risks that we might face tomorrow. Will drones produce a safer world because they reduce risk to pilots, or will the prospect of clean, remote warfare lead governments to engage in more conflicts? Will drones begin to replace humans on the battlefield? Will they empower soldiers and peacekeepers to act more precisely and humanely in crisis zones? How will terrorist organizations turn this technology back on the governments that fight them? And how are drones enhancing surveillance capabilities, both at war and at home? As advanced drones come into the hands of new actors-foreign governments, local law enforcement, terrorist organizations, humanitarian organizations, and even UN peacekeepers-it is even more important to understand what kind of world they might produce. The Drone Age explores how the unique features of drone technology are altering the decision-making processes of governments and non-state actors alike by transforming their risk calculations and expanding their capacities both on and off the battlefield. By changing what these actors are willing and ready to do, drones are quietly transforming the dynamics of wars, humanitarian crises, and peacekeeping missions while generating new risks to security and privacy. An essential guide to a potentially disruptive force in modern world politics, The Drone Age shows how the innovative use of drone technology will become central to the ways that governments and non-state actors compete for power and influence in the future.
Released on 2020-05-27Categories Science

STEM in the Technopolis: The Power of STEM Education in Regional Technology Policy

STEM in the Technopolis: The Power of STEM Education in Regional Technology Policy

Author: Cliff Zintgraff

Publisher: Springer Nature

ISBN: 9783030398514

Category: Science

Page: 323

View: 572

This book addresses how forward-thinking local communities are integrating pre-college STEM education, STEM pedagogy, industry clusters, college programs, and local, state and national policies to improve educational experiences, drive local development, gain competitive advantage for the communities, and lead students to rewarding careers. This book consists of three sections: foundational principles, city/regional case studies from across the globe, and state and national context. The authors explore the hypothesis that when pre-college STEM education is integrated with city and regional development, regions can drive a virtuous cycle of education, economic development, and quality of life. Why should pre-college STEM education be included in regional technology policy? When local leaders talk about regional policy, they usually talk about how government, universities and industry should work together. This relationship is important, but what about the hundreds of millions of pre-college students, taught by tens of millions of teachers, supported by hundreds of thousands of volunteers, who deliver STEM education around the world? Leaders in the communities featured in STEM in the Technopolis have recognized the need to prepare students at an early age, and the power of real-world connections in the process. The authors advocate for this approach to be expanded. They describe how STEM pedagogy, priority industry clusters, cross-sector collaboration, and the local incarnations of global development challenges can be made to work together for the good of all citizens in local communities. This book will be of interest to government policymakers, school administrators, industry executives, and non-profit executives. The book will be useful as a reference to teachers, professors, industry professional volunteers, non-profit staff, and program leaders who are developing, running, or teaching in STEM programs or working to improve quality of life in their communities.
Released on 2022-11-08Categories History

U.S. Air Force Special Tactics

U.S. Air Force Special Tactics

Author: Combat Control School Heritage Foundation

Publisher: AuthorHouse

ISBN: 9781665546331

Category: History

Page: 2772

View: 616

The CCT - The Eye of the Storm-series chronicles the exploits of Air Force Special Warfare, Combat Control Teams (CCT). It is told in the form of short stories; many etched by a cocktail of blood, sweat and tears. The Combat Control story began in the de facto Volume I with the appearance of the first CCTs; i.e., command and control teams cobbled together by the WWII U.S. Army Air Force (USAAF) for Operation Varsity. The CCT story continued in Volume II, detailing the 21st Century fight in the Global War on Terrorism (GWOT). Included are two humanitarian missions; operations of epic proportion in Haiti and Japan. In this third volume subtitled - Medal of Honor (MOH) - the CCT story is expanded, incorporating the two previously self-published volumes and adding hundreds of new stories from around the globe. But, with a concentration on operations in southwest Asia; including Afghanistan; now America’s longest war. This volume is an all-inclusive compilation presented as a single, premium publication. The diversity of feature stories, subjects and styles present a well-rounded, unbiased look at the CCT’s view at “the eye of the storm.” Each published PA reporter and volunteer contributor has a by-line in the book. Thanks to all for their remarkable journalistic work. The book is expected to engage a wider-ranging audience of American and allied military elements, families, historians and enthusiasts. More importantly, Medal of Honor celebrates the first-ever award of the Air Force Medal of Honor to a Combat Control patriot and hero. On April 20, 2018 after more than fifteen years technical review and Air Staff deliberation the Medal of Honor for TSgt John Chapman was approved by President Donald Trump. The MOH award ceremonies and associated events are covered in detail near the end of this book. In preparing CCT - The Eye of the Storm - Medal of Honor, the goal was to collect stories from hundreds of sources, written by an even larger band of vetted professionals selected to observe, record and report truths about military units in action. In my mind the U.S. Government Public Affairs Offices were the perfect choice. For that reason, you will find hundreds of PA-generated stories used herein. Through our collective efforts we have published a fair and accurate chronical of USAF Combat Control Team’s stories; exploiting the public domain and declassified accounts. This is a documentary of Air Force Combat Control Teams operating at The Eye of the Storm. Subtitled Medal of Honor; it is the most in-depth CCT history ever published.