This multi-Service tactics, techniques, and procedures (MTTP) publication will assist in advising foreign forces. It serves as a reference to ensure coordinated multi-Service operations for planners and operators preparing for, and conducting, advisor team missions. This MTTP is intended to provide units and personnel that are scheduled to advise foreign forces (FF) with viable tactics, techniques, and procedures (TTP) so that they can successfully plan, train for, and carry out their mission. Currently, material regarding advising is found in joint and Service doctrinal treatment of foreign internal defense (FID), counterinsurgency (COIN), security assistance (SA), and unconventional warfare (UW). Several Services are developing documents that focus on basic survival and common advisor skills, but do not sufficiently cover how an advisor team might function at all levels. This MTTP provides guidance that will help to enhance the activities of some advisor functions and improve inter-Service coordination for this joint mission.
Every year as technology grows and advances thus do the threats that surround it. Predicting what new cyber threats to look for may not always be an easy task. By keeping up with the past trends and ever changing current environment, may help to give us a good handle on how to prepare for what may be to come.
U.S. Air Force presentation detailing human interface systems for drone ground control stations from May 2010.
RPAs are revolutionary surveillance and weapons delivery systems – changing the way the Air Force builds situation awareness and engages enemy forces – but their full potential has yet to be realized. To begin to address this issue, the Air Force initiated this study to review the state-of-the-art in RPA operations, focusing on control and connectivity in an irregular warfare (IW) environment. The Panel was specifically tasked to identify RPA architectures and operational concepts centered on human-systems integration, distributed systems operations, and effective command and control – a cluster of concepts and technologies we subsequently labeled as “mission management” enablers. The Panel was also tasked to recommend mid- to far-term S&T development roadmaps for advancing these technologies to improve the flexibility and capability of RPA operations.
Air Force Policy Directive 91-4 on safety in using directed energy weapons (DEW) revised October 21, 2011.
U.S. Air Force models U-2C and U-2F spy plane aircraft flight manual from May 10, 1967.
A restricted distribution presentation from the U.S. Air Force Research Laboratory massive cloud traffic auditing and online data mining presentation from July 2011.
Four versions of the U.S. Army and Air Force civil disturbance plan known as Garden Plot from 1968-1991.
This manual provides preplanning guidance for handling emergency situations, which include the full spectrum from civil disobedience through hostile disturbances to violent acts of terrorism. It discusses the concept of operations in planning for these crisis situations and offers an outline for preparation, execution and resolution of mass disturbances. Air National Guard units will use this manual as guidance. The use of name or mark of any specific manufacturer, commercial product, commodity or service in this publication does not imply endorsement by the Air Force.
Unregulated psychoactive substances marketed as “bath salts” are among the latest in a series of legal synthetic drugs that are being offered as alternatives to illegal drugs. Produced as legal substitutes for ecstasy, cocaine and amphetamines, salts are powerful stimulant drugs designed to avoid legal prosecution and are commonly available on the internet and specialty head shops. They can be made up of a variety of unregulated chemical substances and are being sold under a variety of names or brands. Open sources indicate that “bath salts” are becoming increasingly popular due to the perception that they pose seemingly safer alternative to illegal methods of getting “high” and can easily be obtained over the Internet. Concerns regarding the safety of these drugs have prompted many European countries to take measures to stop the imports and selling of these products within their borders. Recent seizures nationwide suggest these powdered salts are making inroads in the US, thus becoming narcotics of potential concern.
Restricted U.S. Air Force F-16A/B Flight Manual from August 15, 2003.
The following five reports are from the U.S. Air Force Air Combat Command’s Threat Information Fusion Cell. The “Homeland Defense Information Summary” reports focus entirely on domestic security matters and feature content from local police departments and regional fusion centers. The very existence of the reports should be a matter of scrutiny given the fundamental divide between domestic military affairs and civilian law enforcement necessitated by legislation such as the Posse Comitatus Act.
This guide provides Air Force Public Affairs professionals with basic social media knowledge needed to maneuver in the online information space and the basic-level tactics explained here should be used to compliment the traditional forms of Public Affairs, to include internal communication, community relations and media relations.
The basic concept of the AEF we use today was born of necessity after years of rotations between Operations Northern Watch and Southern Watch. High operations tempo (OPSTEMPO) forced us to update our Air Force-wide system of organizing, scheduling and presenting our forces to combatant commanders (CCDRs). Launched in 1998 by Gen Mike Ryan, CSAF, Cycle 1 of the AEF was 15 months long and included approximately 60,000 Airmen. Today the AEF operates on a 24-month schedule and includes over 300,000 Airmen. It remains fl exible to accommodate CCDR’s needs, whether for 4 months, 6 months, or 365 days.
Air Force personnel should not access the WikiLeaks website to view or download the publicized classified information. Doing so would introduce potentially classified infonnation on unclassified networks. There has been rumor that the information is no longer classified since it resides in the public domain. This is NOT true. Executive Order 13526, Section 1.1 ( 4)( c) states “Classified Information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information …
This report focuses on Integrated Air and Missile Defense as practiced by the Combined Air Component Headquarters at Osan AB, Korea. The study was conducted during Exercise Key Resolve 2010 (KR 10) and highlights the outstanding integration of Army, Navy, Marine and Air Force planning and execution of the IAMD mission. The report examines the work done in this particular theater of operations in developing a comprehensive Airspace Control Plan (ACP) and Area Air Defense Plan (AADP). While this report looks at only one operational theater and many other theaters face separate and distinct challenges, this report should provide lessons and insights that benefit multiple theaters.
On July 29, 2010, Public Intelligence received a notice from Paul Malcolm of Booz Allen Hamilton in support of the U.S. Air Force Key Management Infrastructure program. Mr. Malcolm is very polite in requesting the removal of two “For Official Use Only” documents, one of which, he says, is proprietary. Both documents concern the Simple Key Loader, a fill device used to load cryptographic keys into encryption systems. The first document is the U.S. Air Force SKL Wireless & Black Data Distribution System Overview. The second is the Simple Key Loader Instruction Guide. Neither of the documents bear any particular markings indicating their proprietary nature. While he does not specify which document is proprietary, it is possible that the SKL Instruction Guide is thought to be proprietary because it concerns the functioning and operation of a device produced under contract and ostensibly owned by the Sierra Nevada Corporation. In fact, it is from the official website of the Sierra Nevada Corporation that both of these documents were originally and inadvertently made available. One is still available.
This guide presents reference material associated with planning and executing programs and operations for protecting Air Force personnel and assets against the threat of vehicle bombs – it is designed for use by a variety of key players, ranging from the Airman at the base gate to the Installation Commander. As with all sound force protection efforts, this guide tackles the threat class using a multi-dimensional approach incorporating threat detection and loss mitigation.
(U//FOUO) U.S. Air Force 21st Century Threat Guide, 2009.
The International Distributed Uniform Reporting Environment (INDURE) software application provides both a data repository and the reporting tools to interact with that repository in a user-friendly manner. Users are able to insert information into the data repository using a wide variety of reports and make that data available to an international audience. Furthermore, users can query all the data within INDURE and export that data to a variety of external formats and programs. The purpose of INDURE is to provide a data repository into which non DoD communities like NGO’s, USAID and others involved in civil capacity, socio cultural information, events of significance and engagement data can all can input, share, extract and analyze data in concert with DoD entities. INDURE provides these communities with standardized reporting tools that span significant activities (SIGACTS), Civil Capacity information, Socio Cultural and Engagement disciplines.
This Concept of Operations (CONOPS) identifies and describes the use of International Distributed Unified Reporting Environment (INDURE) Version 1.1 on the World Wide Web Internet domain. Under the guidance of the United States Central Command (USCENTCOM) Theater and Under Secretary Defense – Intelligence (USD-I), the need for INDURE was scoped and funded. INDURE will be fully interoperable with the Combined Information Data Network Exchange (CIDNE) (which resides on Secret and higher classification networks) and will be able to exchange data with CIDNE. The Secret-to-Unclassified exchange will require data to be air-gapped between the systems due to the classification of the information domain CIDNE resides on and will require FDO and/or release authority to move data between domains.
FOUO U.S. Air Force SKL (Simple Key Loader) Instruction Guide, July 2007.
This report compares United States and Israeli homeland security practices. Its purpose is to determine whether there are lessons from Israeli experience that might enhance U.S. homeland security efforts. The research for this study included a literature review as well as field interviews with American and Israeli elites in Washington, D.C., and Israel during the summer of 2005. The principle investigator met with key Israeli homeland security and counterterrorism experts in Jerusalem, Tel Aviv, Ramla, and Hertzilya.
Air Force Research Laboratory Information Directorate
AFRL/RI Leadership Chart — As of 29 MAY 09
Rome Research Site, Rome, NY
Commercial: 315 330-plus (last four)
DSN: 587 plus (last four)
# ‘Building Partnership Capacity’ Seminars and Mini-games
# Support Other Service & Joint Wargames
# Coordinate/Participate with Subject Matter Experts
# Represent Approved AF Positions