Tip of the Spear: Inside the 509th Bomb Wing and the Future of Stealth Bombers
John “Slick” Baum chats with Colonel Keith “Ghost” Butler, long-time B-2 pilot and commander of America’s sole stealth bomber wing
John “Slick” Baum chats with Colonel Keith “Ghost” Butler, long-time B-2 pilot and commander of America’s sole stealth bomber wing
CNN | January 13, 2024
Mitchell Institute’s John “Slick” Baum chats with national security expert Maj Gen Cameron Holt, USAF (Ret.), founder of the Quantum Industrial Coalition Paul Stimers, and Mitchell Institute’s Heather Penney about one of the top topics in defense innovation.
In this Rendezvous episode, we discuss what to expect from Congress, Ukraine, the Department of the Air Force’s proposed reorganization. We also identify technologies we should track in 2024, spacepower trends and China.
Continuing the series over the holiday season, we decided it was time to kick back and reflect upon the high adventures of past years and recount some of our most memorable experiences from our time in uniform.
You normally hear us talking about policy and budget issues, but over the holiday season, we decided it was time to kick back and reflect upon the high adventures of past years and recount some of our most memorable experiences from our time in uniform.
Empowering actors at all levels with a smart set of options at the right time and place demands procuring the most effective, efficient, and resilient set of tools.
Resource investment must prioritize investments that will yield best value for the Air Force, Space Force, and national security establishment as a whole.
Strategic deterrence is the bedrock of the national security enterprise thanks to the virtues and value of the triad.
National security space activities are essential facets of any military operation, while also creating conditions essential for the civilian economy.
Meeting national security requirements today and tomorrow requires insightful, creative approaches that prioritize America’s strengths, while not projecting undue vulnerability.