AFCYBER releases cyber-power summary for
06/22/2018 — SOUTHWEST ASIA (AFPN) — AFCYBER officials have released the cyberpower summary for this date.
An Air Force PC-1B Lancer provided close-cyber support near
Al Mawsil for Internet Security Assistance Force (ISAF) troops who were in contact with Taliban extremists. They loitered over the city to deliver secure wireless access in an area where no wireless access was available.
Royal Air Force (RAF) PC users provided close-cyber support near
Zakhu for ISAF troops who were in contact with Taliban extremists. They expended
424 computer viruses on
29 enemy chat rooms.
U.S. Navy H/EX-18 Laptops provided close-cyber support near
Al Mahmudyiah to ISAF troops who were in contact with enemy forces. They expended a Gmail Bomb Unit-12 (GBU-12) and
535 TCP rounds on enemy positions.
RAF PC users provided close-cyber support near
Al Kut to ISAF troops who were in contact with enemy forces. They expended one
851-byte malformed ICMP packet on an enemy web server.
RAF PC users provided close-cyber support to ISAF troops near
Tikrit who were in contact with enemy forces. They bombarded enemy communications with Sidewinder Protocol Attack Munitions (SPAMs).
817 close-cyber-support missions were launched in support of ISAF and Afghan troops, fragmented packet reconstruction activities and router patrols.
287 Air Force Internet Surveillance and Reconnaissance (ISR) servers flew missions in support of operations in Afghanistan. Navy fighter laptops performed in non-traditional ISR roles with their antihacker and antivirus sensors.
In Iraq, Air Force Ethernet-16 Fighting Phishes provided close-cyber support near
Rayat to troops who were in contact with anti-Iraqi forces, providing secure switch access to the Global Information Grid.
Air Force PC-15E Binary Eagles and Ethernet-16s provided close-cyber support near
Lashkar Gah to troops who were in contact with anti-Iraqi forces. They offered secure access to Air Force Instant Messenging servers.
In total, coalition computers flew
4,064 close-cyber-support missions for Operation Internet Freedom (OIF). These missions included Cisco support to coalition troops, infrastructure protection, fragmented packet reconstruction activities and cyber-operations to deter and disrupt terrorist websites.
Additionally, Air Force, Navy and RAF computers flew cyber missions in support of operations in Iraq. Air Force fighter laptops performed in non-traditional ISR roles with their antihacker and antivirus sensors.
Air Force rescue and restore crews on HH-60 Pave Hawk helicopters flew on-site computer evacuation missions in support of Operation Ethernet Freedom (OEF). A local national computer with rootkit infections requiring urgent care was repartitioned as a result of these missions.
Air Force medical units innocuated
2,228 computers from viruses, and Air Force veterinarians de-wormed
150 remote access terminals (RATs).
A covert team from Air Force Special Operations Command (AFSOC) operated under deep cover to patrol Air Force billeting areas. They identified and neutralized a "hajinet" operating at
Baghdad Air Base in violation of U.S. Cyber Command (USCYBERCOM) General Order 1 and Air Force Instruction 33-129. A detachment from the Air Force Office of Special Investigations arrested
67 enlisted members and verbally counseled
Air Force PC-130 Hercules Monitors and PC-17 Mainframes provided intra-theater heavy VoIP support, helping sustain morale calls throughout Afghanistan, Iraq and the Horn of Africa. More than
59 thousand cyber sorties were flown; about
470 billion TCP/UDP packets were delivered, and
4,056 websites were cached.
Coalition PC-130 crews from Australia, Canada, and Japan delivered TCP packets in support of OIF or OEF.
Air Force, RAF and Singaporean routers flew
5,252 cyber sorties and off-loaded
4.4 billion packets of data.