AFCYBER releases cyber-power summary for
01/19/2018 — SOUTHWEST ASIA (AFPN) — AFCYBER officials have released the cyberpower summary for this date.
An Air Force PC-1B Lancer provided close-cyber support near
As Sulaymaniyah for Internet Security Assistance Force (ISAF) troops who were in contact with Taliban extremists. They loitered over the city to deliver secure wireless access in an area where no wireless access was available.
Royal Air Force (RAF) PC users provided close-cyber support near
Al Mahmudyiah for ISAF troops who were in contact with Taliban extremists. They expended
384 computer viruses on
27 enemy chat rooms.
U.S. Navy H/EX-18 Laptops provided close-cyber support near
Lashkar Gah to ISAF troops who were in contact with enemy forces. They expended a Gmail Bomb Unit-12 (GBU-12) and
513 TCP rounds on enemy positions.
RAF PC users provided close-cyber support near
Zakhu to ISAF troops who were in contact with enemy forces. They expended one
890-byte malformed ICMP packet on an enemy web server.
RAF PC users provided close-cyber support to ISAF troops near
Karbala who were in contact with enemy forces. They bombarded enemy communications with Sidewinder Protocol Attack Munitions (SPAMs).
862 close-cyber-support missions were launched in support of ISAF and Afghan troops, fragmented packet reconstruction activities and router patrols.
281 Air Force Internet Surveillance and Reconnaissance (ISR) servers flew missions in support of operations in Afghanistan. Navy fighter laptops performed in non-traditional ISR roles with their antihacker and antivirus sensors.
In Iraq, Air Force Ethernet-16 Fighting Phishes provided close-cyber support near
Baghdad to troops who were in contact with anti-Iraqi forces, providing secure switch access to the Global Information Grid.
Air Force PC-15E Binary Eagles and Ethernet-16s provided close-cyber support near
Nukhayb to troops who were in contact with anti-Iraqi forces. They offered secure access to Air Force Instant Messenging servers.
In total, coalition computers flew
3,829 close-cyber-support missions for Operation Internet Freedom (OIF). These missions included Cisco support to coalition troops, infrastructure protection, fragmented packet reconstruction activities and cyber-operations to deter and disrupt terrorist websites.
Additionally, Air Force, Navy and RAF computers flew cyber missions in support of operations in Iraq. Air Force fighter laptops performed in non-traditional ISR roles with their antihacker and antivirus sensors.
Air Force rescue and restore crews on HH-60 Pave Hawk helicopters flew on-site computer evacuation missions in support of Operation Ethernet Freedom (OEF). A local national computer with rootkit infections requiring urgent care was repartitioned as a result of these missions.
Air Force medical units innocuated
2,388 computers from viruses, and Air Force veterinarians de-wormed
134 remote access terminals (RATs).
A covert team from Air Force Special Operations Command (AFSOC) operated under deep cover to patrol Air Force billeting areas. They identified and neutralized a "hajinet" operating at
Balad Air Base in violation of U.S. Cyber Command (USCYBERCOM) General Order 1 and Air Force Instruction 33-129. A detachment from the Air Force Office of Special Investigations arrested
86 enlisted members and verbally counseled
Air Force PC-130 Hercules Monitors and PC-17 Mainframes provided intra-theater heavy VoIP support, helping sustain morale calls throughout Afghanistan, Iraq and the Horn of Africa. More than
40 thousand cyber sorties were flown; about
229 billion TCP/UDP packets were delivered, and
3,101 websites were cached.
Coalition PC-130 crews from Australia, Canada, and Japan delivered TCP packets in support of OIF or OEF.
Air Force, RAF and Singaporean routers flew
6,104 cyber sorties and off-loaded
3.0 billion packets of data.