AFCYBER releases cyber-power summary for
03/20/2019 — SOUTHWEST ASIA (AFPN) — AFCYBER officials have released the cyberpower summary for this date.
An Air Force PC-1B Lancer provided close-cyber support near
Bayji for Internet Security Assistance Force (ISAF) troops who were in contact with Taliban extremists. They loitered over the city to deliver secure wireless access in an area where no wireless access was available.
Royal Air Force (RAF) PC users provided close-cyber support near
Ar Rutbah for ISAF troops who were in contact with Taliban extremists. They expended
390 computer viruses on
26 enemy chat rooms.
U.S. Navy H/EX-18 Laptops provided close-cyber support near
Al Mahmudyiah to ISAF troops who were in contact with enemy forces. They expended a Gmail Bomb Unit-12 (GBU-12) and
563 TCP rounds on enemy positions.
RAF PC users provided close-cyber support near
Al Basrah to ISAF troops who were in contact with enemy forces. They expended one
886-byte malformed ICMP packet on an enemy web server.
RAF PC users provided close-cyber support to ISAF troops near
As Sulaymaniyah who were in contact with enemy forces. They bombarded enemy communications with Sidewinder Protocol Attack Munitions (SPAMs).
787 close-cyber-support missions were launched in support of ISAF and Afghan troops, fragmented packet reconstruction activities and router patrols.
305 Air Force Internet Surveillance and Reconnaissance (ISR) servers flew missions in support of operations in Afghanistan. Navy fighter laptops performed in non-traditional ISR roles with their antihacker and antivirus sensors.
In Iraq, Air Force Ethernet-16 Fighting Phishes provided close-cyber support near
Baghdad to troops who were in contact with anti-Iraqi forces, providing secure switch access to the Global Information Grid.
Air Force PC-15E Binary Eagles and Ethernet-16s provided close-cyber support near
Al Kut to troops who were in contact with anti-Iraqi forces. They offered secure access to Air Force Instant Messenging servers.
In total, coalition computers flew
3,863 close-cyber-support missions for Operation Internet Freedom (OIF). These missions included Cisco support to coalition troops, infrastructure protection, fragmented packet reconstruction activities and cyber-operations to deter and disrupt terrorist websites.
Additionally, Air Force, Navy and RAF computers flew cyber missions in support of operations in Iraq. Air Force fighter laptops performed in non-traditional ISR roles with their antihacker and antivirus sensors.
Air Force rescue and restore crews on HH-60 Pave Hawk helicopters flew on-site computer evacuation missions in support of Operation Ethernet Freedom (OEF). A local national computer with rootkit infections requiring urgent care was repartitioned as a result of these missions.
Air Force medical units innocuated
2,398 computers from viruses, and Air Force veterinarians de-wormed
132 remote access terminals (RATs).
A covert team from Air Force Special Operations Command (AFSOC) operated under deep cover to patrol Air Force billeting areas. They identified and neutralized a "hajinet" operating at
Tallil Air Base in violation of U.S. Cyber Command (USCYBERCOM) General Order 1 and Air Force Instruction 33-129. A detachment from the Air Force Office of Special Investigations arrested
84 enlisted members and verbally counseled
Air Force PC-130 Hercules Monitors and PC-17 Mainframes provided intra-theater heavy VoIP support, helping sustain morale calls throughout Afghanistan, Iraq and the Horn of Africa. More than
50 thousand cyber sorties were flown; about
193 billion TCP/UDP packets were delivered, and
3,792 websites were cached.
Coalition PC-130 crews from Australia, Canada, and Japan delivered TCP packets in support of OIF or OEF.
Air Force, RAF and Singaporean routers flew
5,450 cyber sorties and off-loaded
1.1 billion packets of data.