AFCYBER releases cyber-power summary for
11/14/2018 — SOUTHWEST ASIA (AFPN) — AFCYBER officials have released the cyberpower summary for this date.
An Air Force PC-1B Lancer provided close-cyber support near
Tikrit for Internet Security Assistance Force (ISAF) troops who were in contact with Taliban extremists. They loitered over the city to deliver secure wireless access in an area where no wireless access was available.
Royal Air Force (RAF) PC users provided close-cyber support near
Dahuk for ISAF troops who were in contact with Taliban extremists. They expended
435 computer viruses on
24 enemy chat rooms.
U.S. Navy H/EX-18 Laptops provided close-cyber support near
Al Basrah to ISAF troops who were in contact with enemy forces. They expended a Gmail Bomb Unit-12 (GBU-12) and
565 TCP rounds on enemy positions.
RAF PC users provided close-cyber support near
Zakhu to ISAF troops who were in contact with enemy forces. They expended one
780-byte malformed ICMP packet on an enemy web server.
RAF PC users provided close-cyber support to ISAF troops near
Tikrit who were in contact with enemy forces. They bombarded enemy communications with Sidewinder Protocol Attack Munitions (SPAMs).
940 close-cyber-support missions were launched in support of ISAF and Afghan troops, fragmented packet reconstruction activities and router patrols.
289 Air Force Internet Surveillance and Reconnaissance (ISR) servers flew missions in support of operations in Afghanistan. Navy fighter laptops performed in non-traditional ISR roles with their antihacker and antivirus sensors.
In Iraq, Air Force Ethernet-16 Fighting Phishes provided close-cyber support near
Ar Ramadi to troops who were in contact with anti-Iraqi forces, providing secure switch access to the Global Information Grid.
Air Force PC-15E Binary Eagles and Ethernet-16s provided close-cyber support near
Al Mawsil to troops who were in contact with anti-Iraqi forces. They offered secure access to Air Force Instant Messenging servers.
In total, coalition computers flew
3,168 close-cyber-support missions for Operation Internet Freedom (OIF). These missions included Cisco support to coalition troops, infrastructure protection, fragmented packet reconstruction activities and cyber-operations to deter and disrupt terrorist websites.
Additionally, Air Force, Navy and RAF computers flew cyber missions in support of operations in Iraq. Air Force fighter laptops performed in non-traditional ISR roles with their antihacker and antivirus sensors.
Air Force rescue and restore crews on HH-60 Pave Hawk helicopters flew on-site computer evacuation missions in support of Operation Ethernet Freedom (OEF). A local national computer with rootkit infections requiring urgent care was repartitioned as a result of these missions.
Air Force medical units innocuated
2,275 computers from viruses, and Air Force veterinarians de-wormed
131 remote access terminals (RATs).
A covert team from Air Force Special Operations Command (AFSOC) operated under deep cover to patrol Air Force billeting areas. They identified and neutralized a "hajinet" operating at
Tallil Air Base in violation of U.S. Cyber Command (USCYBERCOM) General Order 1 and Air Force Instruction 33-129. A detachment from the Air Force Office of Special Investigations arrested
92 enlisted members and verbally counseled
Air Force PC-130 Hercules Monitors and PC-17 Mainframes provided intra-theater heavy VoIP support, helping sustain morale calls throughout Afghanistan, Iraq and the Horn of Africa. More than
59 thousand cyber sorties were flown; about
295 billion TCP/UDP packets were delivered, and
3,548 websites were cached.
Coalition PC-130 crews from Australia, Canada, and Japan delivered TCP packets in support of OIF or OEF.
Air Force, RAF and Singaporean routers flew
5,704 cyber sorties and off-loaded
3.3 billion packets of data.