go to center home page Air Force information operations click for Air University home page
home | AWC Gateway | Air University Library | military portal
other centers - strategy & technology | space | culture | pace | counterproliferation

see also joint and other services page

see also resources on influence operations page

see also schools and courses, especially DoD


Air Force ResourcesBack to Top

  • see also USAF & cyberspace

  • see also same section on Intelligence page

  • see also gov/mil cultural awareness resources, at the Culture & Language Studies

  • 24th Air Force

  • Air Force Chief of Warfighting Integration and Chief Information Officer

  • Air Force Director of Communication - SAF/CM
    • Air Force Director of Communication, Office of the Secretary of the Air Force, Washington, D.C. He is responsible for the integration and synchronization of planning, execution, and assessment processes focused on delivering truthful, timely, accurate and credible communications to inform and enhance relations with key internal and external audiences.

  • Air Force Director of Public Affairs - SAF/PA

  • Air Force Announces Decision On Location Of 24th Air Force, 12 Aug 2009, Office of the Assistant Secretary of Defense (Public Affairs)
    • The U.S. Air Force announced today that Lackland Air Force Base, Texas, has been selected as the permanent location of the 24th Air Force headquarters, a numbered air force (NAF) designed to conduct cyber operations activities for the Air Force.
    • "The standup of this NAF will provide clear lines of authority and responsibility dedicated to cyber operations," said, Maj. Gen. Richard Webber, who will assume command of 24th Air Force later this month.

  • Air Force Network Integration Center (AFNIC), formerly Air Force Communications Agency

  • Air Force Research Laboratory (AFRL)
    • Software Protection Initiative (SPI), AF Research Lab (AFRL)
      • The Software Protection Initiative (SPI) protects critical DoD intellectual property against nation-state class threats by taking an alternative approach to security based on 3 Tenets
        • 1) Focus on What’s Critical,
        • 2) Move it Out-of-Band, and
        • 3) Detect, React, Adapt.
        SPI researches, designs, develops, tests, and deploys protections to prevent piracy, tampering, and reverse engineering of critical software code and data. SPI builds cost effective, adoptable, strong defenses from today’s commercial components. The Air Force Research Laboratory’s Anti-Tamper Software Protection Initiative (ATSPI) Technology Office manages SPI for the DDR&E via the High Performance Computing and Modernization Program.

    • Information Institute, AF Research Lab (AFRL)
      • The Institute is a virtual, collaborative research environment concentrating on Information Science and Technology. The Information Institute currently consists of universities allied with the US Air Force Research Laboratory Information Directorate at the Rome Research Site and Wright Research Site.

    • Human Effectiveness Directorate, AF Research Lab (AFRL)
      • Information Operations
        • Competency-Based Information Operations Training
        • Live-Virtual-Constructive Electronic Warfare Training
        • Cultural Modeling and Audience Awareness
        • CryptoLinguist Training
        • Decision Support for Target Assessment
        • Training and Rehearsal Tools for Psychological Operations
        • Human Performance Improvements for Information Warfare C2

  • Air Force Global Cyberspace Integration Center (GCIC), formerly known as Air Force Command and Control & Intelligence, Surveillance, and Reconnaissance Center (AFC2ISRC)
    • As a Field Operating Agency of the Deputy Chief of Staff, Warfighting Integration, the Global Cyberspace Intergration Center mission is to support AF/XI initiatives to influence, integrate and improve Air Force C4ISR capabilities. The GCIC is focused on Joint Force and Joint Force Air Component Commanders' capability to dominate the battlespace and control forces.
    • Air Force Global Cyberspace Integration Center's (GCIC) submission site
      • The purpose of this site is to facilitate organizations/companies, both government and civilian, in the submissions of innovations to improve the Air Force and Joint C4ISR capabilities.

  • Air Force Knowledge Management, from AFMC

  • AFDD 3-13 Information Operations
  • AFDD 3-61 Public Affairs Operations
  • AFDD 2-9 Intelligence, Surveillance, and Reconnaissance Operations
  • AFDD 3-12 Cyberspace Operations

  • See also Air Force Publications, especially electronic pubs for Intelligence, Communication, and Information Management

  • USAF ISR Agency, formerly known as Air Intelligence Agency (AIA)
    • 70th Intelligence Wing (IW)
    • Air Force Iinformation Operations Center (AFIOC)
    • National Air & Space Intelligence Center (NASIC), formerly known as NAIC
    • 67th Information Operations Wing (IOW)
    • 480th Intelligence Wing (IW)
    • AIA Technology Demonstration Center (TDC)

  • National Air & Space Intelligence Center (NASIC)

  • Behavioral Influences Analysis Studies, formerly Behavioral Influences Analysis Center (BIAC)

  • Center for Cyberspace Research (CCR), Air Force Institute of Technology (AFIT) - "Our objective is to provide advanced Cyberspace education/training & lead cyber force development."

  • See also ACC Information Operations Steering Group, at ACC under Focus Areas

  • AF Command and Control Training and Innovation Group (AFC2TIG), Hurlburt Field, FL
  • C2 Warrior School, Hurlburt Field, FL -- includes class schedules and instructional CD-ROMs on C2, ATOs, targeting, JAOC functions, Master Air Attack Plan, CTAPS, etc.

  • Air Force Agency for Modeling and Simulation (AFAMS), "supporting the joint synthetic battlespace"
  • Public Relations & Media Relations page, at Air War College Gateway to the Internet

  • Information War and the Air Force: Wave of the Future? Current Fad?, by Buchan, RAND, Mar 1996

  • Project Broadsword, Air Force Research Lab, Rome Research Site, "an innovative information integration software application that enables an organization to manage heterogeneous, distributed resources. With the assistance of Broadsword, an organization can tie together diverse information resources, perform intelligent searches, and visually display the results in a manner that aids and simplifies the decision making process."

  • Old News
    • 8th Air Force to become new cyber command, AF Print News, 2 Nov 2006
    • USAF AIM Points, 2 Nov 2006
      • "Secretary of the Air Force Michael W. Wynne announced today that the 8th Air Force is now the service's lead command for cyberspace.

        "The command's new responsibility is a potential step to becoming an Air Force major command. The move accompanies the service's ever-increasing reliance on operations within the cyberspace domain.

        "The 8th Air Force will be responsible for training, organizing and equipping the service for cyberspace operations and managing career planning to grow cyberspace professionals from among the active duty, guard, reserve, and civilian ranks.

        "In December 2005, the Air Force mission statement was amended to include cyberspace as an opera! tional domain along with air and space. The service stood up the Cyberspace Task Force in January, led by military strategist Dr. Lani Kass. The task force, composed of Airmen from across the Air Force, has spent the past ten months gathering data and exploring how the service operates effectively in cyberspace.

        "The traditional principles of war as taught to young officers apply fully in cyberspace, and cyberspace operations can include far more than computer network attack and defense. The use of improvised explosive devices in Iraq, terrorist use of Global Positioning Satellites and satellite communications, internet financial transactions by adversaries, radar and navigational jamming, and attacking American servers as just a few examples of operations that involve the cyberspace domain."

    • AF launches cyberspace task force (local copy), by Proctor, Air Force Print News, 6 Apr 2006
      • “It’s where we provide reach, speed, distance, stealth, and precision in air, space and cyberspace across natural and man-made boundaries," she said. "It is far more than the components that make it. The content, context and cognition matter greatly."
      • “Anything we can create to exploit and control in cyberspace can be done to us and done cheaper and faster,” Dr. Kass said.
      • And there’s no constraint of distance, time, or space and no social and political boundaries. The fact that the country is so dependent on cyberspace makes it vulnerable, she said.
      • Another part of the task force’s mission is to increase awareness about cyberspace because most people don’t understand it or feel there is any threat.
      • “They [adversary] can not only use cyberspace in new, asymmetrical ways, but can actually make it fit their needs." Dr. Kass said. "There’s low entry cost, high impact, and little chance of attribution. Cyberspace’s edge for an enemy is they can strike from a distance and at lightening speed -- at the stroke of a key board.”

-- RETURN TO TOP --

see
privacy and security notice and web maintainer
page updated/reviewed 23 Mar 2011
Accessibility/Section 508





























.