The various airmen leading the air war had great differences of opinion regarding what to target in the European theater of operations in support of Operation Overlord. The central leadership figures were Lt. General Carl Spaatz, USSTAF commander, and Air Chief Marshal Trafford Leigh-Mallory, AEAF commander. Each of these military men obviously wanted to support the planned Allied invasion, but they held differing opinions in regard to how to best support the invasion troops. They were greatly influenced by both personal experience and the advice of their respective scientific advisors, Walt...
The various airmen leading the air war had great differences of opinion regarding what to target in the European theater of operations in support of O...
Stalingrad is often described as the turning point of the German war with the Soviet Union, or perhaps even the entire European war. This paper argues that the actual turning point was probably earlier in the Barbarossa campaign, and that the decision to hold Stalingrad, while a serious mistake, followed several other strategic blunders of Adolf Hitler. Given that, this essay reflects a study of primary source material collected from key German commanders, as well as numerous documents collected in 1956 as part of the "Karlsruhe Collection." The focus was to determine where the airlift...
Stalingrad is often described as the turning point of the German war with the Soviet Union, or perhaps even the entire European war. This paper argues...
Our reliance on computers and information-based technologies within DOD has greatly increased our potential for vulnerability if our information systems are attacked. DOD systems now receive numerous intrusion attempts daily and this trend appears to be increasing. It is paramount that DOD develops appropriate defensive courses of action to systematically and appropriately counter the threat of future cyber attacks. The main problem is distinguishing the type of intrusion or attack and developing the mechanisms to appropriately respond whether by law enforcement or military action. This book...
Our reliance on computers and information-based technologies within DOD has greatly increased our potential for vulnerability if our information syste...