|Home | Reservation Request Form|
Starting February 12 and continuing thru February 13th, the Lodging operations at JBER-Elmendorf and JBER-Richardson will be without their computer system. And due to a loss of computers we may be a little slower than normal please bear with us as we will be operating manually.
The North Star Inn Lodging offers hospitality to all those who are here temporarily or permanently. Reservations are taken 24 hours a day, seven days a week.
Bldg 7153 Phone: 552-2454 Hours: Open 24 hours a day seven days a week.
Transient facilities include one, two and three bedroom units for families. These units have everything needed to live comfortably while in a travel status, including a full kitchen. Washer/dryers are available either in your unit or in a common laundry room located in the complex.
To make a reservation at another Air Force Base, call 1-888-AF LODGE (1-888-235-6343) and follow the voice prompts to be connected to the Air Force Inn of your choice.
|Follow us on
The appearance of hyperlinks does not constitute endorsement by the U.S. Air Force of this Web site or the information, products or services contained therein. For other than authorized activities such as military exchanges and Morale, Welfare and Recreation sites, the U.S. Air Force does not exercise any editorial control over the information you may find at these locations. Such links are provided consistent with the stated purpose of this U.S. Air Force Web site.
This site is intended for the use of DoD personnel only. Do not reproduce or distribute the content of this site to a wider audience without coordination with the information owner, your unit legal and public affairs offices. This is a Department of Defense computer system. This computer system, including all related equipment, networks, and network devices (specifically including Internet access) are provided only for authorized U.S. Government use. DoD computer systems may be monitored for all lawful purposes, including; ensuring authorized use, managing the system, facilitating protection against unauthorized access, and to verifying security procedures, survivability, and operational security. Monitoring includes active attacks by authorized DoD entities to test or verify the security of this system. During monitoring, information may be examined, recorded, copied, and used for authorized purposes. All information, including personal information, placed on or sent over this system may be monitored. Use of this DoD computer system, authorized or unauthorized, constitutes consent to monitoring of this system. Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal, or other adverse action. Use of this system constitutes consent to monitoring for these purposes.