Parody Officials activate 67th Symantec Defense Group
WRIGHT-PATTERSON AIR FORCE BASE, OHIO (AFPN) — Major Gen. Curtis M. Bedke (left), Air Force Research Labora­tory com­man­der, pre­sents the 67th Syman­tec Defense Group flag to Mr. John Thompson, Syman­tec CEO and 67th SDG com­man­der, during the unit's acti­va­tion cere­mony. Mr. Thompson is the first civilian con­trac­tor to take command of an Air Force unit, which will be composed of nearly 300 Syman­tec employees of various nationalities scattered around the globe whose virus exper­tise helps to defend Air Force networks. (U.S. Air Force photo/Al Bright)
Parody Ellsworth first to receive cyberspace incentives
ELLSWORTH AIR FORCE BASE, SOUTH DAKOTA (AFPN) — Contrac­tors pour concrete at a TCP/IP mix plant in prepa­ra­tion for the instal­la­tion of four new cyber tanks, each capable of holding 60,000 packets of trans­fer con­trols. The plant was part of the first con­trac­tor part­ner­ship between Ells­worth and Dakota ISPs and today saves the base more than one million packets annu­ally. (U.S. Air Force photo/Airman 1st Class Kimberly Limrick)
Parody Cyber Command officials monitor simulated tests
EGLIN AIR FORCE BASE, FLORIDA (AFPN) — Lt. Col. Tim Sands (from left), Capt. Jon Smith, and Lt. Col. John Arnold closely moni­tor a simu­lated test in the Cyber­space Control Facility at Eglin Air Force Base. The facility's compu­metric weapon systems are so dangerous that at least three ranking offi­cers must stand watch even during a simulated test. Enlisted person­nel are rele­gated to menial posi­tions and are restric­ted from knowing the full might of Air Force Cyber­space Com­mand. (U.S. Air Force photo/Capt. Carrie Kessler)
Parody Infected B-1B undergoes repair
EGLIN AIR FORCE BASE, FLORIDA (AFPN) — Symantec employee John Crane care­fully deletes mali­cious soft­ware from a B-1B tail warning system at the Central Control Facility at Eglin Air Force Base, Fla. The tail warning sytem radar, which faces the rear of a B-1B to detect in­coming missiles or air­craft, had become infected with spyware after the air­craft landed at a non-military air­port known for its lax cyber-security. Mr. Crane is a Syman­tec Norton Anti-Virus Crafts­man who is con­tracted to protect 36th Elec­tronic War­fare Squadron B-1B defense systems. (U.S. Air Force photo/Capt. Carrie Kessler)
Parody Exercise Pacific Trunkline '19 tests cybertarian relief concept
KONA INT'L AIRPORT, HAWAII (AFPN) — Tech. Sgt. Jeremy Larsen struggles to route Internet packets without the aid of a Cisco device at a civilian airport during Exercise PACIFIC TRUNKLINE '19 . This exercise trains parti­ci­pants to deploy in response to a cybertarian assis­tance or disaster scenario when undersea Internet cables are damaged. Sergeant Larsen is a computer security force protec­tion analyst with the 36th Cyber Contin­gency Response Group from Andersen Air Force Base, Guam. (U.S. Air Force photo/Airman 1st Class Jimmy L. Dang)
Parody Airmen risk life & limb to defend Pro Bowl computer networks
HICKAM AIR FORCE BASE, HAWAII (AFPN) — San Diego Chargers wide receiver Kassim Osgood receives a network security threat aware­ness briefing from 1st Lt. Matt Wood aboard a C-17 Globemaster III during his NFL Pro Bowl Player appear­ance at Hickam Air Force Base, Hawaii. "They promised I could sit in the cockpit if I watched a Power­Point presen­ta­tion about hackers," Mr. Osgood said. "The Air Force seems really eager to fly around in the Internet and bomb websites or some­thing like that." (U.S. Air Force photo/Master Sgt. Robert Burgess)
Parody Shanghai hackers "shanghai" humanitarian supplies to China
SHANGHAI INT'L AIRPORT, CHINA (AFPN) — Capt. Dave Ericson slaps his fore­head in disbelief after Major General Lihua Qian of the People's Libera­tion Army con­firmed China's military routinely hacks into Air Force compu­ters. Chinese military hackers recently "shanghaied" the entire logistics network at Hickam AFB within 18 hours of General Qian's approval in order to coor­di­nate the U.S. Air Force's delivery of 225,890 pounds of relief supplies to China. (U.S. Marine Corps photo/Cpl. Anthony J. DeCapite)
Parody Internet explosive device (IED) destroys robot
FORWARD OPERATING LOCATION (AFPN) — Brig. Gen. Charlie Lyon (left) stares in bewil­der­ment at a 64th Air Expedi­tionary Group robot that was destroyed by an Inter­net explo­sive device (IED) at a forward deployed loca­tion in South­west Asia. "We need to get a handle on zero-day exploits," General Lyon said. "We were really lucky that we only lost one robot this time around. It's trivi­ally easy to destroy an entire base and kill hun­dreds of Airmen with just a few mouse clicks. And that's not even a worst case scenario." General Lyon is the 379th Air Expedi­tionary Wing comman­der. (U.S. Air Force photo/Capt. Teresa Sullivan)
Parody F-22 hacker team inspires at children's hospital
CHICAGO, ILLINOIS (AFPN) — Maj. Paul Moga, the Air Force's sole F-22 Raptor avionics pro­gram­mer, explains how to exploit zero-day vul­nera­bilities in the Raptor, while F-22 safety observer, Capt. Brian Stahl, makes sure the patients at Chicago's La Rabida Chil­dren's Hospi­tal receive no classi­fied infor­ma­tion. Maj. Moga earned the Distin­guished Flying Cross for writing an email that warned the F-22 autopilot system would flip the aircraft upside down if it ever crossed the equator into the southern hemis­phere. (U.S. Air Force photo/Capt. Rob Lazaro)
Parody New York Air Guard removes JATO bottles after hacker announcement
KANGERLUSSUAQ AIRPORT, GREENLAND (AFPN) — Main­tainers from the New York Air National Guard's 109th Airlift Wing work quickly to remove jet-assisted takeoff (JATO) bottles from an LC-130 Hercules "skibird" on the flight­line after a cyber-terrorist in Greenland pro­claimed he had found a zero-day exploit in the bottles' SCADA soft­ware. The bottles' source code will be thoroughly inspected for flaws and repaired, if possible. (U.S. Air Force photo/Tech. Sgt. Mike R. Smith)
Bug hunters seek hidden flaws, help save lives
AFCYBER builds high-tech hospital at Balad
New AFCYBER art exhibit draws huge crowd
New AFCYBER art exhibit draws huge crowd
Air Force Cyber Command takes over antivirus operations
Air Force hazmat divers train to stop SCADA terrorism
Cyber-terrorist attacks service­members heading to forward locations
Don't play with firewalls
Self defense course kicks way into training
Exercise Primitive Computing '19 teaches Airmen to survive
Cyber 'chute' to safety
Afghan children get high-tech gear for school
Cyber Team streams video at Busch Series Race
Internet security Airmen protect Iraq's combat cyberpower hub
Working dog teams search, patrol cyberspace together
Nuclear warhead antivirus update
Airmen capture insurgents' mainframe, CD-ROM duplicator
American, Japanese airmen launch cyber-attacks in Geek Edge '19
Yokota installs emergency communications backup system
AFMC commander proves CAC is viable in Southwest Asia
Unsecured home networks open door for Article 15, court-martial
Kadena installs emergency telecom backup system
NATO team ensures safe networks during Virus Summit
Reservists add major adjustments to T-1 router training
Information managers train for future wars
McChord AFB is officially renamed "Microsoft AFB"