Parody
AFCYBER releases cyber-power summary for Jul. 20

07/20/2017 — SOUTHWEST ASIA (AFPN) — AFCYBER officials have released the cyberpower summary for this date.

An Air Force PC-1B Lancer provided close-cyber support near An Nasiriyah for Internet Security Assistance Force (ISAF) troops who were in contact with Taliban extremists. They loitered over the city to deliver secure wireless access in an area where no wireless access was available.

Royal Air Force (RAF) PC users provided close-cyber support near Kirkuk for ISAF troops who were in contact with Taliban extremists. They expended 398 computer viruses on 31 enemy chat rooms.

U.S. Navy H/EX-18 Laptops provided close-cyber support near Tikrit to ISAF troops who were in contact with enemy forces. They expended a Gmail Bomb Unit-12 (GBU-12) and 533 TCP rounds on enemy positions.

RAF PC users provided close-cyber support near Nukhayb to ISAF troops who were in contact with enemy forces. They expended one 874-byte malformed ICMP packet on an enemy web server.

RAF PC users provided close-cyber support to ISAF troops near Zakhu who were in contact with enemy forces. They bombarded enemy communications with Sidewinder Protocol Attack Munitions (SPAMs).

In total, 950 close-cyber-support missions were launched in support of ISAF and Afghan troops, fragmented packet reconstruction activities and router patrols.

Additionally, 259 Air Force Internet Surveillance and Reconnaissance (ISR) servers flew missions in support of operations in Afghanistan. Navy fighter laptops performed in non-traditional ISR roles with their antihacker and antivirus sensors.

In Iraq, Air Force Ethernet-16 Fighting Phishes provided close-cyber support near Lashkar Gah to troops who were in contact with anti-Iraqi forces, providing secure switch access to the Global Information Grid.

Air Force PC-15E Binary Eagles and Ethernet-16s provided close-cyber support near Bayji to troops who were in contact with anti-Iraqi forces. They offered secure access to Air Force Instant Messenging servers.

In total, coalition computers flew 4,056 close-cyber-support missions for Operation Internet Freedom (OIF). These missions included Cisco support to coalition troops, infrastructure protection, fragmented packet reconstruction activities and cyber-operations to deter and disrupt terrorist websites.

Additionally, Air Force, Navy and RAF computers flew cyber missions in support of operations in Iraq. Air Force fighter laptops performed in non-traditional ISR roles with their antihacker and antivirus sensors.

Air Force rescue and restore crews on HH-60 Pave Hawk helicopters flew on-site computer evacuation missions in support of Operation Ethernet Freedom (OEF). A local national computer with rootkit infections requiring urgent care was repartitioned as a result of these missions.

Air Force medical units innocuated 2,291 computers from viruses, and Air Force veterinarians de-wormed 151 remote access terminals (RATs).

A covert team from Air Force Special Operations Command (AFSOC) operated under deep cover to patrol Air Force billeting areas. They identified and neutralized a "hajinet" operating at Balad Air Base in violation of U.S. Cyber Command (USCYBERCOM) General Order 1 and Air Force Instruction 33-129. A detachment from the Air Force Office of Special Investigations arrested 95 enlisted members and verbally counseled 17 officers.

Air Force PC-130 Hercules Monitors and PC-17 Mainframes provided intra-theater heavy VoIP support, helping sustain morale calls throughout Afghanistan, Iraq and the Horn of Africa. More than 69 thousand cyber sorties were flown; about 406 billion TCP/UDP packets were delivered, and 3,983 websites were cached.

Coalition PC-130 crews from Australia, Canada, and Japan delivered TCP packets in support of OIF or OEF.

Air Force, RAF and Singaporean routers flew 6,063 cyber sorties and off-loaded 2.2 billion packets of data.

Parody