Air Force Policy Directive 91-4 on safety in using directed energy weapons (DEW) revised October 21, 2011.
U.S. Air Force
U.S. Air Force
U.S. Air Force U-2 Spy Plane Flight Manual May 1967
U.S. Air Force models U-2C and U-2F spy plane aircraft flight manual from May 10, 1967.
U.S. Air Force, U.S. Air Force Research Laboratory
U.S. Air Force Massive Cloud Traffic Auditing and Online Data Mining Presentation
A restricted distribution presentation from the U.S. Air Force Research Laboratory massive cloud traffic auditing and online data mining presentation from July 2011.
U.S. Air Force, U.S. Army
U.S. Army and U.S. Air Force “Garden Plot” Civil Disturbance Plans 1968-1991
Four versions of the U.S. Army and Air Force civil disturbance plan known as Garden Plot from 1968-1991.
U.S. Air Force
U.S. Air Force Civil Disturbance Manual
This manual provides preplanning guidance for handling emergency situations, which include the full spectrum from civil disobedience through hostile disturbances to violent acts of terrorism. It discusses the concept of operations in planning for these crisis situations and offers an outline for preparation, execution and resolution of mass disturbances. Air National Guard units will use this manual as guidance. The use of name or mark of any specific manufacturer, commercial product, commodity or service in this publication does not imply endorsement by the Air Force.
U.S. Air Force
(U//FOUO) LulzSec Release: U.S. Air Force Bath Salts Report
Unregulated psychoactive substances marketed as “bath salts” are among the latest in a series of legal synthetic drugs that are being offered as alternatives to illegal drugs. Produced as legal substitutes for ecstasy, cocaine and amphetamines, salts are powerful stimulant drugs designed to avoid legal prosecution and are commonly available on the internet and specialty head shops. They can be made up of a variety of unregulated chemical substances and are being sold under a variety of names or brands. Open sources indicate that “bath salts” are becoming increasingly popular due to the perception that they pose seemingly safer alternative to illegal methods of getting “high” and can easily be obtained over the Internet. Concerns regarding the safety of these drugs have prompted many European countries to take measures to stop the imports and selling of these products within their borders. Recent seizures nationwide suggest these powdered salts are making inroads in the US, thus becoming narcotics of potential concern.
U.S. Air Force
U.S. Air Force F-16A/B Flight Manual
Restricted U.S. Air Force F-16A/B Flight Manual from August 15, 2003.
U.S. Air Force
(U//FOUO/LES) U.S. Air Combat Command Threat Information Fusion Cell Reports
The following five reports are from the U.S. Air Force Air Combat Command’s Threat Information Fusion Cell. The “Homeland Defense Information Summary” reports focus entirely on domestic security matters and feature content from local police departments and regional fusion centers. The very existence of the reports should be a matter of scrutiny given the fundamental divide between domestic military affairs and civilian law enforcement necessitated by legislation such as the Posse Comitatus Act.
U.S. Air Force
U.S. Air Force Social Media Guide
This guide provides Air Force Public Affairs professionals with basic social media knowledge needed to maneuver in the online information space and the basic-level tactics explained here should be used to compliment the traditional forms of Public Affairs, to include internal communication, community relations and media relations.
U.S. Air Force
(U//FOUO) Air Force Wing Leadership Guide to the Air and Space Expeditionary Force (AEF)
The basic concept of the AEF we use today was born of necessity after years of rotations between Operations Northern Watch and Southern Watch. High operations tempo (OPSTEMPO) forced us to update our Air Force-wide system of organizing, scheduling and presenting our forces to combatant commanders (CCDRs). Launched in 1998 by Gen Mike Ryan, CSAF, Cycle 1 of the AEF was 15 months long and included approximately 60,000 Airmen. Today the AEF operates on a 24-month schedule and includes over 300,000 Airmen. It remains fl exible to accommodate CCDR’s needs, whether for 4 months, 6 months, or 365 days.
U.S. Air Force
U.S. Air Force Warning Against Accessing WikiLeaks
Air Force personnel should not access the WikiLeaks website to view or download the publicized classified information. Doing so would introduce potentially classified infonnation on unclassified networks. There has been rumor that the information is no longer classified since it resides in the public domain. This is NOT true. Executive Order 13526, Section 1.1 ( 4)( c) states “Classified Information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information …
U.S. Air Force
(U//FOUO) Air Force Integrated Air and Missile Defense Report
This report focuses on Integrated Air and Missile Defense as practiced by the Combined Air Component Headquarters at Osan AB, Korea. The study was conducted during Exercise Key Resolve 2010 (KR 10) and highlights the outstanding integration of Army, Navy, Marine and Air Force planning and execution of the IAMD mission. The report examines the work done in this particular theater of operations in developing a comprehensive Airspace Control Plan (ACP) and Area Air Defense Plan (AADP). While this report looks at only one operational theater and many other theaters face separate and distinct challenges, this report should provide lessons and insights that benefit multiple theaters.
U.S. Air Force
(U//FOUO) U.S. Air Force Vehicle Bomb Mitigation Guide
This guide presents reference material associated with planning and executing programs and operations for protecting Air Force personnel and assets against the threat of vehicle bombs – it is designed for use by a variety of key players, ranging from the Airman at the base gate to the Installation Commander. As with all sound force protection efforts, this guide tackles the threat class using a multi-dimensional approach incorporating threat detection and loss mitigation.
U.S. Air Force
(U//FOUO) U.S. Air Force 21st Century Threat Guide
(U//FOUO) U.S. Air Force 21st Century Threat Guide, 2009.
U.S. Air Force, U.S. Air Force Research Laboratory
INternational Distributed Unified Reporting Environment (INDURE) User Guide
The International Distributed Uniform Reporting Environment (INDURE) software application provides both a data repository and the reporting tools to interact with that repository in a user-friendly manner. Users are able to insert information into the data repository using a wide variety of reports and make that data available to an international audience. Furthermore, users can query all the data within INDURE and export that data to a variety of external formats and programs. The purpose of INDURE is to provide a data repository into which non DoD communities like NGO’s, USAID and others involved in civil capacity, socio cultural information, events of significance and engagement data can all can input, share, extract and analyze data in concert with DoD entities. INDURE provides these communities with standardized reporting tools that span significant activities (SIGACTS), Civil Capacity information, Socio Cultural and Engagement disciplines.
U.S. Air Force, U.S. Air Force Research Laboratory, U.S. Central Command
INternational Distributed Unified Reporting Environment (INDURE) V1.1 Concept of Operations
This Concept of Operations (CONOPS) identifies and describes the use of International Distributed Unified Reporting Environment (INDURE) Version 1.1 on the World Wide Web Internet domain. Under the guidance of the United States Central Command (USCENTCOM) Theater and Under Secretary Defense – Intelligence (USD-I), the need for INDURE was scoped and funded. INDURE will be fully interoperable with the Combined Information Data Network Exchange (CIDNE) (which resides on Secret and higher classification networks) and will be able to exchange data with CIDNE. The Secret-to-Unclassified exchange will require data to be air-gapped between the systems due to the classification of the information domain CIDNE resides on and will require FDO and/or release authority to move data between domains.
U.S. Air Force
U.S. Air Force SKL Wireless & Black Data Distribution System Overview
FOUO U.S. Air Force Cryptologic Systems Group SKL Wireless & Black Data Distribution System Overview, July 2009.
U.S. Air Force
U.S. Air Force SKL (Simple Key Loader) Instruction Guide
FOUO U.S. Air Force SKL (Simple Key Loader) Instruction Guide, July 2007.
U.S. Air Force
Angel Thunder 2010
U.S. Air Force
Comparative U.S.-Israeli Homeland Security
This report compares United States and Israeli homeland security practices. Its purpose is to determine whether there are lessons from Israeli experience that might enhance U.S. homeland security efforts. The research for this study included a literature review as well as field interviews with American and Israeli elites in Washington, D.C., and Israel during the summer of 2005. The principle investigator met with key Israeli homeland security and counterterrorism experts in Jerusalem, Tel Aviv, Ramla, and Hertzilya.
U.S. Air Force
Wargaming: Enabling the Warfighter for the Future
# ‘Building Partnership Capacity’ Seminars and Mini-games
# Support Other Service & Joint Wargames
# Coordinate/Participate with Subject Matter Experts
# Represent Approved AF Positions
U.S. Air Force
Space Weather and the Space Environmental Effects Monitoring System
The natural space environment affects military operations because warfighters depend on space-based assets to execute combat missions
* Single event upsets (SEUs) due to high energy particles
* Satellite position errors due to changes in atmospheric density
* Comm/nav capability degraded or lost because of ionospheric anomalies
U.S. Air Force
Air Force Advanced Technical Exploitation Contract
Rapid and generally automated exploitation and reporting with adequate human intervention to produce actionable intelligence. This activity ranges from data processing to initial data interpretation to data posting for rapid dissemination/access across the community. It supports current intelligence issues and threats, warning/combat/crisis operations, and cueing other intelligence collectors.