Social Media, the Fastest Growing Vulnerability to the Air Force Mission

Social Media, the Fastest Growing Vulnerability to the Air Force Mission

Author: Scott E. Solomon

Publisher: United States Department of Defense

Published: 2017

Total Pages: 48

ISBN-13: 9781585662715

DOWNLOAD EBOOK

"The inherent risks and vulnerabilities of the Internet and social networking sites like Facebook, LinkedIn, and Twitter have cultivated a rich and ripe environment for foreign adversaries and criminals to cherry-pick personal information about Airmen and their missions for nefarious activities. FBI guidance encourages users to reduce their online footprint in cyberspace rather to proliferate it. This paper addresses some of the most common threats and vulnerabilities of the social media environment, the risks of using social media, and current Air Force social media guidance. It recommends revising Air Force social media guidance and outlines cyberspace best practices. An informed workforce can better protect the Air Force mission and reduce the risk of becoming a target of opportunity."--Provided by publisher


Book Synopsis Social Media, the Fastest Growing Vulnerability to the Air Force Mission by : Scott E. Solomon

Download or read book Social Media, the Fastest Growing Vulnerability to the Air Force Mission written by Scott E. Solomon and published by United States Department of Defense. This book was released on 2017 with total page 48 pages. Available in PDF, EPUB and Kindle. Book excerpt: "The inherent risks and vulnerabilities of the Internet and social networking sites like Facebook, LinkedIn, and Twitter have cultivated a rich and ripe environment for foreign adversaries and criminals to cherry-pick personal information about Airmen and their missions for nefarious activities. FBI guidance encourages users to reduce their online footprint in cyberspace rather to proliferate it. This paper addresses some of the most common threats and vulnerabilities of the social media environment, the risks of using social media, and current Air Force social media guidance. It recommends revising Air Force social media guidance and outlines cyberspace best practices. An informed workforce can better protect the Air Force mission and reduce the risk of becoming a target of opportunity."--Provided by publisher


Social Media

Social Media

Author: Scott E. Solomon

Publisher: Createspace Independent Publishing Platform

Published: 2017-07-24

Total Pages: 48

ISBN-13: 9781973751281

DOWNLOAD EBOOK

Social media is the fastest growing vulnerability to the military mission and the personal security of all Airmen. On 30 November 2014, the FBI issued warning to members of the US military and requested that they review their social media presence for any information like names and addresses that might attract the attention of violent ISIS extremists. Over the past decade, the convergence of mobile broadband devices has enabled social media to become more and more integrated into our everyday lives. The inherent risks and vulnerabilities of the internet and social networking sites like Facebook, LinkedIn, and Twitter along with the Air Force's endorsement to actively use social media, has cultivated a rich and ripe environment for foreign adversaries and criminals to cherry-pick personal information about Airmen and their missions for nefarious activities. To help Americans understand the risks that come with being online, the Department of Homeland Security launched a new cybersecurity awareness campaign: Stop, Think, and Connect. To educate Airmen on social media, AF public affairs created the "Air Force Social Media Guide" in 2013 to encourage Airmen to share their AF experiences with family and friends in the social media environment. However, this is counter to the FBI's guidance that promotes the reduction of users' on-line footprint and online presence in cyberspace.


Book Synopsis Social Media by : Scott E. Solomon

Download or read book Social Media written by Scott E. Solomon and published by Createspace Independent Publishing Platform. This book was released on 2017-07-24 with total page 48 pages. Available in PDF, EPUB and Kindle. Book excerpt: Social media is the fastest growing vulnerability to the military mission and the personal security of all Airmen. On 30 November 2014, the FBI issued warning to members of the US military and requested that they review their social media presence for any information like names and addresses that might attract the attention of violent ISIS extremists. Over the past decade, the convergence of mobile broadband devices has enabled social media to become more and more integrated into our everyday lives. The inherent risks and vulnerabilities of the internet and social networking sites like Facebook, LinkedIn, and Twitter along with the Air Force's endorsement to actively use social media, has cultivated a rich and ripe environment for foreign adversaries and criminals to cherry-pick personal information about Airmen and their missions for nefarious activities. To help Americans understand the risks that come with being online, the Department of Homeland Security launched a new cybersecurity awareness campaign: Stop, Think, and Connect. To educate Airmen on social media, AF public affairs created the "Air Force Social Media Guide" in 2013 to encourage Airmen to share their AF experiences with family and friends in the social media environment. However, this is counter to the FBI's guidance that promotes the reduction of users' on-line footprint and online presence in cyberspace.


Social Media

Social Media

Author: U. S. Military

Publisher:

Published: 2017-04-02

Total Pages: 79

ISBN-13: 9781520985343

DOWNLOAD EBOOK

Social media is the fastest growing vulnerability to the military mission and the personal security of all Airmen. On 30 November 2014, the FBI issued warning to members of the US military and requested that they review their social media presence for any information like names and addresses that might attract the attention of violent ISIS extremists. Over the past decade, the convergence of mobile broadband devices has enabled social media to become more and more integrated into our everyday lives. The inherent risks and vulnerabilities of the internet and social networking sites like Facebook, LinkedIn, and Twitter along with the Air Force's endorsement to actively use social media, has cultivated a rich and ripe environment for foreign adversaries and criminals to cherry-pick personal information about Airmen and their missions for nefarious activities. To help Americans understand the risks that come with being online, the Department of Homeland Security launched a new cybersecurity awareness campaign: Stop, Think, and Connect. To educate Airmen on social media, AF public affairs created the "Air Force Social Media Guide" in 2013 to encourage Airmen to share their AF experiences with family and friends in the social media environment. However, this is counter to the FBI's guidance that promotes the reduction of users' on-line footprint and online presence in cyberspace. Public Affairs published the "Air Force Social Media Guide" in 2013 to encourage Airmen to share their Air Force experiences with family and friends in the social media environment with the following introduction: "This guide will help you share information effectively while following Air Force instructions and protecting operations security." The guide does an excellent job identifying the "shoulds" and "should nots" in social media; however, the guide does not address hardware vulnerabilities or the risks of using social media sites. This paper will respond to some of the most common threats and vulnerabilities of the social media environment, the risks of using social media, and the current Air Force social media guidance. It will also provide recommendations to educate better and inform Airmen and their families on using social media sites and cyberspace best practices. Today's cyberspace environment provides an engaging interactive experience for social networking, picture and video sharing, and blogs that keep end users engaged and wanting to share or consume more information. In addition to social media sites, commercial web services, online commerce services, and the hardware used for networking can provide the means to compromise sensitive information. Threats to desktop computer hardware are important but fall outside the scope of this paper; an example is in the notes. Today's hackers have discovered exquisite ways to install malware on a user's computer hardware through seemingly innocuous means by exploiting security breaches in social media websites that use Java, Ajax, or other popular software technologies. Opening up files or hyperlinks attached to social media messages or email attachments may contain malware that can bypass firewalls or virus protection programs. In many cases, this happens without the user knowing they have become a victim or that their hardware is infected.


Book Synopsis Social Media by : U. S. Military

Download or read book Social Media written by U. S. Military and published by . This book was released on 2017-04-02 with total page 79 pages. Available in PDF, EPUB and Kindle. Book excerpt: Social media is the fastest growing vulnerability to the military mission and the personal security of all Airmen. On 30 November 2014, the FBI issued warning to members of the US military and requested that they review their social media presence for any information like names and addresses that might attract the attention of violent ISIS extremists. Over the past decade, the convergence of mobile broadband devices has enabled social media to become more and more integrated into our everyday lives. The inherent risks and vulnerabilities of the internet and social networking sites like Facebook, LinkedIn, and Twitter along with the Air Force's endorsement to actively use social media, has cultivated a rich and ripe environment for foreign adversaries and criminals to cherry-pick personal information about Airmen and their missions for nefarious activities. To help Americans understand the risks that come with being online, the Department of Homeland Security launched a new cybersecurity awareness campaign: Stop, Think, and Connect. To educate Airmen on social media, AF public affairs created the "Air Force Social Media Guide" in 2013 to encourage Airmen to share their AF experiences with family and friends in the social media environment. However, this is counter to the FBI's guidance that promotes the reduction of users' on-line footprint and online presence in cyberspace. Public Affairs published the "Air Force Social Media Guide" in 2013 to encourage Airmen to share their Air Force experiences with family and friends in the social media environment with the following introduction: "This guide will help you share information effectively while following Air Force instructions and protecting operations security." The guide does an excellent job identifying the "shoulds" and "should nots" in social media; however, the guide does not address hardware vulnerabilities or the risks of using social media sites. This paper will respond to some of the most common threats and vulnerabilities of the social media environment, the risks of using social media, and the current Air Force social media guidance. It will also provide recommendations to educate better and inform Airmen and their families on using social media sites and cyberspace best practices. Today's cyberspace environment provides an engaging interactive experience for social networking, picture and video sharing, and blogs that keep end users engaged and wanting to share or consume more information. In addition to social media sites, commercial web services, online commerce services, and the hardware used for networking can provide the means to compromise sensitive information. Threats to desktop computer hardware are important but fall outside the scope of this paper; an example is in the notes. Today's hackers have discovered exquisite ways to install malware on a user's computer hardware through seemingly innocuous means by exploiting security breaches in social media websites that use Java, Ajax, or other popular software technologies. Opening up files or hyperlinks attached to social media messages or email attachments may contain malware that can bypass firewalls or virus protection programs. In many cases, this happens without the user knowing they have become a victim or that their hardware is infected.


Lcr, Like, Comment, Retweet

Lcr, Like, Comment, Retweet

Author: Heidi A. Urben

Publisher: Government Printing Office

Published: 2017-06-30

Total Pages: 68

ISBN-13: 9780160939600

DOWNLOAD EBOOK

Through a survey of more than 500 military elites attending the United States Military Academy and National Defense University, this project seeks to establish the nature and extent of political expression by members of the military throughout social media and whether or not such expression is in keeping with the norm of nonpartisanship. Findings suggest that while most military elites continue to identify as conservative and Republican, fewer appear to do so today than at any other time over the past 30 years. Second, military elites actively use social media networking sites, although younger elites are more prolific in their use. Third, while respondents' nonmilitary friends were more politically active than their military friends, both active duty and retired military actively participate in multiple forms of political and partisan expression, from posting comments on political issues to "friending" political figures. This study concludes by considering the implications these findings carry for the norms of an apolitical, nonpartisan military "Technology and social media make it seductively easy for us to broadcast our private opinions far beyond the confines of our homes. The lines between the professional, personal--and virtual--are blurring. Now more than ever, we have to be exceptionally thoughtful about what we say and how we say it." -- General Martin E. Dempsey, USA (Ret.) Military Leadership and Planners, Congress, Social Media Experts, Academicians in social media and communications Related products: Social Media: The Fastest Growing Vulnerability to the Air Force Mission can be found here: https://bookstore.gpo.gov/products/social-media-fastest-growing-vulnerability-air-force-mission Social Media, The Vital Ground: Can We Hold It? is available here: https://bookstore.gpo.gov/products/social-media-vital-ground-can-we-hold-it Other products published by the US Army, National Defense University Press can be found here: https://bookstore.gpo.gov/agency/national-defense-university-ndu


Book Synopsis Lcr, Like, Comment, Retweet by : Heidi A. Urben

Download or read book Lcr, Like, Comment, Retweet written by Heidi A. Urben and published by Government Printing Office. This book was released on 2017-06-30 with total page 68 pages. Available in PDF, EPUB and Kindle. Book excerpt: Through a survey of more than 500 military elites attending the United States Military Academy and National Defense University, this project seeks to establish the nature and extent of political expression by members of the military throughout social media and whether or not such expression is in keeping with the norm of nonpartisanship. Findings suggest that while most military elites continue to identify as conservative and Republican, fewer appear to do so today than at any other time over the past 30 years. Second, military elites actively use social media networking sites, although younger elites are more prolific in their use. Third, while respondents' nonmilitary friends were more politically active than their military friends, both active duty and retired military actively participate in multiple forms of political and partisan expression, from posting comments on political issues to "friending" political figures. This study concludes by considering the implications these findings carry for the norms of an apolitical, nonpartisan military "Technology and social media make it seductively easy for us to broadcast our private opinions far beyond the confines of our homes. The lines between the professional, personal--and virtual--are blurring. Now more than ever, we have to be exceptionally thoughtful about what we say and how we say it." -- General Martin E. Dempsey, USA (Ret.) Military Leadership and Planners, Congress, Social Media Experts, Academicians in social media and communications Related products: Social Media: The Fastest Growing Vulnerability to the Air Force Mission can be found here: https://bookstore.gpo.gov/products/social-media-fastest-growing-vulnerability-air-force-mission Social Media, The Vital Ground: Can We Hold It? is available here: https://bookstore.gpo.gov/products/social-media-vital-ground-can-we-hold-it Other products published by the US Army, National Defense University Press can be found here: https://bookstore.gpo.gov/agency/national-defense-university-ndu


Conflict in the 21st Century

Conflict in the 21st Century

Author: Nicholas Michael Sambaluk

Publisher: Bloomsbury Publishing USA

Published: 2019-08-08

Total Pages: 456

ISBN-13:

DOWNLOAD EBOOK

This reference work examines how sophisticated cyber-attacks and innovative use of social media have changed conflict in the digital realm, while new military technologies such as drones and robotic weaponry continue to have an impact on modern warfare. Cyber warfare, social media, and the latest military weapons are transforming the character of modern conflicts. This book explains how, through overview essays written by an award-winning author of military history and technology topics; in addition to more than 200 entries dealing with specific examples of digital and physical technologies, categorized by their relationship to cyber warfare, social media, and physical technology areas. Individually, these technologies are having a profound impact on modern conflicts; cumulatively, they are dynamically transforming the character of conflicts in the modern world. The book begins with a comprehensive overview essay on cyber warfare and a large section of A–Z reference entries related to this topic. The same detailed coverage is given to both social media and technology as they relate to conflict in the 21st century. Each of the three sections also includes an expansive bibliography that serves as a gateway for further research on these topics. The book ends with a detailed chronology that helps readers place all the key events in these areas.


Book Synopsis Conflict in the 21st Century by : Nicholas Michael Sambaluk

Download or read book Conflict in the 21st Century written by Nicholas Michael Sambaluk and published by Bloomsbury Publishing USA. This book was released on 2019-08-08 with total page 456 pages. Available in PDF, EPUB and Kindle. Book excerpt: This reference work examines how sophisticated cyber-attacks and innovative use of social media have changed conflict in the digital realm, while new military technologies such as drones and robotic weaponry continue to have an impact on modern warfare. Cyber warfare, social media, and the latest military weapons are transforming the character of modern conflicts. This book explains how, through overview essays written by an award-winning author of military history and technology topics; in addition to more than 200 entries dealing with specific examples of digital and physical technologies, categorized by their relationship to cyber warfare, social media, and physical technology areas. Individually, these technologies are having a profound impact on modern conflicts; cumulatively, they are dynamically transforming the character of conflicts in the modern world. The book begins with a comprehensive overview essay on cyber warfare and a large section of A–Z reference entries related to this topic. The same detailed coverage is given to both social media and technology as they relate to conflict in the 21st century. Each of the three sections also includes an expansive bibliography that serves as a gateway for further research on these topics. The book ends with a detailed chronology that helps readers place all the key events in these areas.


Myths and Realities of Cyber Warfare

Myths and Realities of Cyber Warfare

Author: Nicholas Michael Sambaluk

Publisher: Bloomsbury Publishing USA

Published: 2020-03-01

Total Pages: 230

ISBN-13: 1440870810

DOWNLOAD EBOOK

This illuminating book examines and refines the commonplace "wisdom" about cyber conflict-its effects, character, and implications for national and individual security in the 21st century. "Cyber warfare" evokes different images to different people. This book deals with the technological aspects denoted by "cyber" and also with the information operations connected to social media's role in digital struggle. The author discusses numerous mythologies about cyber warfare, including its presumptively instantaneous speed, that it makes distance and location irrelevant, and that victims of cyber attacks deserve blame for not defending adequately against attacks. The author outlines why several widespread beliefs about cyber weapons need modification and suggests more nuanced and contextualized conclusions about how cyber domain hostility impacts conflict in the modern world. After distinguishing between the nature of warfare and the character of wars, chapters will probe the widespread assumptions about cyber weapons themselves. The second half of the book explores the role of social media and the consequences of the digital realm being a battlespace in 21st-century conflicts. The book also considers how trends in computing and cyber conflict impact security affairs as well as the practicality of people's relationships with institutions and trends, ranging from democracy to the Internet of Things.


Book Synopsis Myths and Realities of Cyber Warfare by : Nicholas Michael Sambaluk

Download or read book Myths and Realities of Cyber Warfare written by Nicholas Michael Sambaluk and published by Bloomsbury Publishing USA. This book was released on 2020-03-01 with total page 230 pages. Available in PDF, EPUB and Kindle. Book excerpt: This illuminating book examines and refines the commonplace "wisdom" about cyber conflict-its effects, character, and implications for national and individual security in the 21st century. "Cyber warfare" evokes different images to different people. This book deals with the technological aspects denoted by "cyber" and also with the information operations connected to social media's role in digital struggle. The author discusses numerous mythologies about cyber warfare, including its presumptively instantaneous speed, that it makes distance and location irrelevant, and that victims of cyber attacks deserve blame for not defending adequately against attacks. The author outlines why several widespread beliefs about cyber weapons need modification and suggests more nuanced and contextualized conclusions about how cyber domain hostility impacts conflict in the modern world. After distinguishing between the nature of warfare and the character of wars, chapters will probe the widespread assumptions about cyber weapons themselves. The second half of the book explores the role of social media and the consequences of the digital realm being a battlespace in 21st-century conflicts. The book also considers how trends in computing and cyber conflict impact security affairs as well as the practicality of people's relationships with institutions and trends, ranging from democracy to the Internet of Things.


Handbook of Research on Cyber Approaches to Public Administration and Social Policy

Handbook of Research on Cyber Approaches to Public Administration and Social Policy

Author: Özsungur, Fahri

Publisher: IGI Global

Published: 2022-06-10

Total Pages: 692

ISBN-13: 1668433818

DOWNLOAD EBOOK

During the COVID-19 era, the functions of social policy and public administration have undergone a meaningful change, especially with the advancement of digital elements and online and virtual functions. Cyber developments, cyber threats, and the effects of cyberwar on the public administrations of countries have become critical research subjects, and it is important to have resources that can introduce and guide users through the current best practices, laboratory methods, policies, protocols, and more within cyber public administration and social policy. The Handbook of Research on Cyber Approaches to Public Administration and Social Policy focuses on the post-pandemic changes in the functions of social policy and public administration. It also examines the implications of the cyber cosmos on public and social policies and practices from a broad perspective. Covering topics such as intersectional racism, cloud computing applications, and public policies, this major reference work is an essential resource for scientists, laboratory technicians, professionals, technologists, computer scientists, policymakers, students, educators, researchers, and academicians.


Book Synopsis Handbook of Research on Cyber Approaches to Public Administration and Social Policy by : Özsungur, Fahri

Download or read book Handbook of Research on Cyber Approaches to Public Administration and Social Policy written by Özsungur, Fahri and published by IGI Global. This book was released on 2022-06-10 with total page 692 pages. Available in PDF, EPUB and Kindle. Book excerpt: During the COVID-19 era, the functions of social policy and public administration have undergone a meaningful change, especially with the advancement of digital elements and online and virtual functions. Cyber developments, cyber threats, and the effects of cyberwar on the public administrations of countries have become critical research subjects, and it is important to have resources that can introduce and guide users through the current best practices, laboratory methods, policies, protocols, and more within cyber public administration and social policy. The Handbook of Research on Cyber Approaches to Public Administration and Social Policy focuses on the post-pandemic changes in the functions of social policy and public administration. It also examines the implications of the cyber cosmos on public and social policies and practices from a broad perspective. Covering topics such as intersectional racism, cloud computing applications, and public policies, this major reference work is an essential resource for scientists, laboratory technicians, professionals, technologists, computer scientists, policymakers, students, educators, researchers, and academicians.


A Concise History of the U.S. Air Force

A Concise History of the U.S. Air Force

Author: Stephen Lee McFarland

Publisher: Createspace Independent Publishing Platform

Published: 1997

Total Pages: 96

ISBN-13:

DOWNLOAD EBOOK

Except in a few instances, since World War II no American soldier or sailor has been attacked by enemy air power. Conversely, no enemy soldier orsailor has acted in combat without being attacked or at least threatened by American air power. Aviators have brought the air weapon to bear against enemies while denying them the same prerogative. This is the legacy of the U.S. AirForce, purchased at great cost in both human and material resources.More often than not, aerial pioneers had to fight technological ignorance, bureaucratic opposition, public apathy, and disagreement over purpose.Every step in the evolution of air power led into new and untrodden territory, driven by humanitarian impulses; by the search for higher, faster, and farther flight; or by the conviction that the air way was the best way. Warriors have always coveted the high ground. If technology permitted them to reach it, men, women andan air force held and exploited it-from Thomas Selfridge, first among so many who gave that "last full measure of devotion"; to Women's Airforce Service Pilot Ann Baumgartner, who broke social barriers to become the first Americanwoman to pilot a jet; to Benjamin Davis, who broke racial barriers to become the first African American to command a flying group; to Chuck Yeager, a one-time non-commissioned flight officer who was the first to exceed the speed of sound; to John Levitow, who earned the Medal of Honor by throwing himself over a live flare to save his gunship crew; to John Warden, who began a revolution in air power thought and strategy that was put to spectacular use in the Gulf War.Industrialization has brought total war and air power has brought the means to overfly an enemy's defenses and attack its sources of power directly. Americans have perceived air power from the start as a more efficient means of waging war and as a symbol of the nation's commitment to technology to master challenges, minimize casualties, and defeat adversaries.


Book Synopsis A Concise History of the U.S. Air Force by : Stephen Lee McFarland

Download or read book A Concise History of the U.S. Air Force written by Stephen Lee McFarland and published by Createspace Independent Publishing Platform. This book was released on 1997 with total page 96 pages. Available in PDF, EPUB and Kindle. Book excerpt: Except in a few instances, since World War II no American soldier or sailor has been attacked by enemy air power. Conversely, no enemy soldier orsailor has acted in combat without being attacked or at least threatened by American air power. Aviators have brought the air weapon to bear against enemies while denying them the same prerogative. This is the legacy of the U.S. AirForce, purchased at great cost in both human and material resources.More often than not, aerial pioneers had to fight technological ignorance, bureaucratic opposition, public apathy, and disagreement over purpose.Every step in the evolution of air power led into new and untrodden territory, driven by humanitarian impulses; by the search for higher, faster, and farther flight; or by the conviction that the air way was the best way. Warriors have always coveted the high ground. If technology permitted them to reach it, men, women andan air force held and exploited it-from Thomas Selfridge, first among so many who gave that "last full measure of devotion"; to Women's Airforce Service Pilot Ann Baumgartner, who broke social barriers to become the first Americanwoman to pilot a jet; to Benjamin Davis, who broke racial barriers to become the first African American to command a flying group; to Chuck Yeager, a one-time non-commissioned flight officer who was the first to exceed the speed of sound; to John Levitow, who earned the Medal of Honor by throwing himself over a live flare to save his gunship crew; to John Warden, who began a revolution in air power thought and strategy that was put to spectacular use in the Gulf War.Industrialization has brought total war and air power has brought the means to overfly an enemy's defenses and attack its sources of power directly. Americans have perceived air power from the start as a more efficient means of waging war and as a symbol of the nation's commitment to technology to master challenges, minimize casualties, and defeat adversaries.


Department of Defense Dictionary of Military and Associated Terms

Department of Defense Dictionary of Military and Associated Terms

Author:

Publisher:

Published: 1984

Total Pages: 428

ISBN-13:

DOWNLOAD EBOOK


Book Synopsis Department of Defense Dictionary of Military and Associated Terms by :

Download or read book Department of Defense Dictionary of Military and Associated Terms written by and published by . This book was released on 1984 with total page 428 pages. Available in PDF, EPUB and Kindle. Book excerpt:


Apollo's Warriors

Apollo's Warriors

Author: Michael E. Haas

Publisher: DIANE Publishing

Published: 1998-05

Total Pages: 388

ISBN-13: 9780788149832

DOWNLOAD EBOOK

Presenting a fascinating insider's view of U.S.A.F. special operations, this volume brings to life the critical contributions these forces have made to the exercise of air & space power. Focusing in particular on the period between the Korean War & the Indochina wars of 1950-1979, the accounts of numerous missions are profusely illustrated with photos & maps. Includes a discussion of AF operations in Europe during WWII, as well as profiles of Air Commandos who performed above & beyond the call of duty. Reflects on the need for financial & political support for restoration of the forces. Bibliography. Extensive photos & maps. Charts & tables.


Book Synopsis Apollo's Warriors by : Michael E. Haas

Download or read book Apollo's Warriors written by Michael E. Haas and published by DIANE Publishing. This book was released on 1998-05 with total page 388 pages. Available in PDF, EPUB and Kindle. Book excerpt: Presenting a fascinating insider's view of U.S.A.F. special operations, this volume brings to life the critical contributions these forces have made to the exercise of air & space power. Focusing in particular on the period between the Korean War & the Indochina wars of 1950-1979, the accounts of numerous missions are profusely illustrated with photos & maps. Includes a discussion of AF operations in Europe during WWII, as well as profiles of Air Commandos who performed above & beyond the call of duty. Reflects on the need for financial & political support for restoration of the forces. Bibliography. Extensive photos & maps. Charts & tables.