Parody
Full archive of Air Force Print News

Computer security team provides safety net for Airmen
Maj. Gen. Kurt A. Cichowski, the Air Force Special Operations Command vice commander, said he's not lauding one operating system or network architecture over the other because they are all needed to fight in today's environment. He said he's merely encouraging Airmen to place AFSOC computers as a priority selection on their dream sheet...

New treatments for warriors' cyberlogical care examined
Trau­matic brain over­load is common with infor­ma­tion over­loads caused by Inter­net explo­sive devices (IEDs) or pene­trating thoughts. These types of over­loads have become rela­tively common in U.S. mili­tary forces who have remotely logged into Iraq and Afghanistan...

Air Force buys Star Trek logo for cyber NAF
The famous "arrowhead insignia" will bolster morale among uniformed personnel, many of whom are longtime fans of the legendary TV shows & movies. "Our peer-equivalent Airmen will become more effective in cyber and space" because they'll be wearing the same futuristic emblem on their uniforms...

AFMC makes important changes to CAC PIN policy
At INFOCON 1, CAC PINs will need to be changed every week. Also, at INFOCON levels above 3, AFMC will randomly declare "Reset Days" where all users must reset the CAC PIN. Users will not be able to log into the AFMC networks when their CAC PIN is due to be reset...

Cyberdyne Systems wins Air Force "botnet" contract
Col. Williamson revealed the Cyber­dyne con­tract includes a clause that says civilian com­pu­ters will not be infected or enslaved as "zombies" under the control of an Air Force botnet. Col. William­son also assured that the con­tract with Cyber­dyne will "protect against fratri­cide by having filters to prevent attacks against .mil, .gov or regi­stered allied addresses, unless speci­fi­cally over­ridden" by the National Command Authority...

Air Force suspends training flights of PC-38 cyberspace aircraft
The crash was the second in two weeks invol­ving a PC-38, fol­lowing an April 23 hacking inci­dent in which two pilots' avatars were killed when their PC-38 opera­ting system crashed at Colum­bus Air Force Base, Mississippi...

Airman worked quickly to save Kenny Chesney's life
The situ­a­tion grew tense when a cyber battle erupted as Mr. Chesney started to rise up on a remote-control hydraulic plat­form. When the terrorists realized they could no longer assassi­nate the country music legend, they made a last-ditch effort to trap his right foot in the device...

AFCYBER vs. Cyber-Hollywood: Why we need cyber dominance
While the "Holly­wood" approach sacri­fices some tech­ni­cal accu­racy, it does an excep­tional job of vividly com­mu­ni­ca­ting the threat of a worst-case cyber-attack scenario, e.g. when the Air Force gets duped into doing the bad guys' bidding to kill U.S. citizens on U.S. soil...

USNORTHCOM hosts cybercane preparation conference
The goal of the two-day conference was to facilitate discussion and strengthen relationships among the attendees. Weather experts from the SANS Internet Storm Center already have predicted 13 named storms in the Internet in the upcoming season, seven of them cybercanes and three of them major. The new season begins June 1 when schools let out for the summer...

Iraqi air force attains hundredfold increase in computers
In the past year, the transition team has transformed Iraqi air force computing from a fledgling corps to an active force that regularly logs into critical transportation, supply and surveillance databases. On the ground, in the meantime, Iraqi air force officials established a cyberspace command center and a cyberwarrior school, plus a technical training school and an academy that has graduated its first class of network cadets...

67th Warcraft Aggressor Squadron stands up
"We must never underestimate cyberspace threats in the Warcraft universe," Colonel Agano said. "Right now we're gathering intelligence on a terrorist group known as 'Serenity Now.'" Despite their name, "they're some of the most dangerous terrorists on the face of the Warcraft world..."

Identity theft forces USCENTAF to become USAFCENT
As a result of the theft, the command was forced to close the "PAS" accounts for the 609th Air Intelligence Group, 609th Air Intelligence Squadron, 609th Combat Operations Squadron, 609th Combat Plans Squadron...

Air Force evacuates 20,000 Americans from cyberspace
Cyberspace firewall sensors indicated multiple cyberspace firewall breaches continued to threaten Americans around the world from 1-4 February 2008. Joint Task Force BYTE HAVEN (JTF-BH), under the operational control of Air Force Cyberspace Command, evacuated the first 2,400 Americans from the most insecure cyberspace cafés and chat rooms on 1 February...

PC egress training increases survival in combat
"The pur­pose of the training is to teach combat Airmen the proper pro­ce­dures to log out from a virus- or spyware-infected com­pu­ter... under con­trolled con­di­tions [that] will allow com­pu­ter occu­pants to gain experi­ence in the proper egress pro­ce­dures. This prac­tice is neces­sary for combat Airmen to achieve self-control and over­come natural fear and panic fol­lowing the cata­strophic event which led to the com­pu­ter being infected..."

Risky Tricare beneficiary data leaked due to reactive response
As a pre­cau­tion, the Depart­ment of De­fense will soon be up­dating its own reac­tive anti­virus soft­ware so its net­works can better de­tect com­pu­ter viruses after the fact...

Cyber-destroyed missile removal begins at Malmstrom
The first of 50 re­motely hacked Minute­man III inter­conti­nen­tal bal­listic missiles was removed from its launch facility after cyber-terrorists destroyed it. If the missiles can be reacti­vated in the future, their anti­virus soft­ware will be hardened to pro­tect them from cyber-terror attacks...

Air Force launches "SSN for Life" initiative
"By using every­one's social secu­rity number as an email address, our members will be able to reach each other any­time and any­where," said Capt. Jason Farms, S4L project officer. "We're also deploying an anti-identity theft solu­tion to pro­tect the Air Force from a world­wide increase in SSN-based fraud..."

Airmen train to wear "electric blue" berets
Airmen are pushed to their limits as they undergo at least two years of rigorous network training. About 97 percent of those who begin the training pipeline never finish it. Instructors look for Airmen who excel both physically and academically, and who can multitask in Windows XP under pressure and while fatigued...

Balad Airmen capture Internet warlord
Four­teen-year-old Abdul "Katrina007" Kitriti was dis­covered hiding in his parents' make­shift home. Three of Kitriti's laptop-armed play­mates were killed when their wire­less net­working cards con­verged on a safe house...

Cyberlogical team protects Balad Airmen from cyberterrorism
"If we can figure out what was in­volved in an attack within three hours and get the proper anti­virus up­dates going with­in 12 hours, we can pre­vent mission degra­da­tion and keep cyber­terrorism from touching our mission," said Major Haak, the cyber­logical aug­men­ta­tion team flight commander...

Information Management Airman killed in cyber-combat
According to reports, Staff Sergeant John "Help" Desk was logged into a patrol router in Baghdad when his laptop was struck by an Internet explosive device...

Air Intelligence Agency renamed for new Internet role
"Internet surveillance and reconnaissance has never been more important during our 60 years as an independent service," General Moseley said. "Cyberspace has become the foundation of global vigilance, reach and power. The transformation initiatives we are beginning will further enhance our ability to fly and fight as America's Air Force..."

DOD blocks 12 popular Internet sites to protect grid
The sites are: wikipedia.org, google.com, dosomethingamazing.com, cnn.com, foxnews.com, espn.com, theregister.co.uk, whitehouse.gov, house.gov, senate.gov, pentagon.mil, and my.af.mil...

Cyber-terror officials stress that Airmen remain aware
"General awareness is very important," said Jack Anthonies, a counter-cyber-terrorism expert at Ramstein Air Base. "Be aware of your surfing habits, and you should constantly vary your routes to websites each day. It makes you a harder target for terrorists..."

Internet ordnance disposal makes for no ordinary day
One day the teams might respond to an IOU on base, or they may assess damage done to computers & data after a network attack. On another day, they might conduct a post-mortem analysis on coalition SCADA equipment struck by an Internet explosive device (IED)...

Cyberspace lyrics for Air Force song
"Logging into the wild blue yonder..."

Suicide hacker destroys Air Force satellite
A recent spate of cyber-terror attacks on "legacy" operating systems has taken its toll on the Air Force's aging fleet of satellites. The men and women of 2nd SOPS now must work around the clock to change satellite login passwords just to keep hackers at bay...

No deaths in Schriever cyber-terror attack
What made the matter worse is that several bases share the same network, an official said. "If you compromise one account on the network, you've potentially compromised the entire Frontrange domain." He said his team hopes to sever all ties between the Schiever network and the rest of the Air Force. But until then, users should beware any email from an Air Force member stationed at another base...

Nature of war requires successful cyberlift
The commander of United States Transport Control Protocol Command visited Bagram Air Base to observe and speak about the cyberlift mission being performed throughout Afghanistan. "This kind of fight cannot be effectively prosecuted from main operating base networks," said General Norton "Symantec" Schwartz. "It's a distributed fight, and that requires us to be able to sustain those forces with distributed computing while they're deployed.."

Course enhances Airmen's cyber-defense techniques
A computer program at Osan Air Base, South Korea, is teaching Internet security forces Airmen how to apply non-life threatening measures of persuasion and restraint. Ultimately, the goal is to resolve all routing conflicts peacefully, say course instructors, but this is not always possible for Internet security forces Airmen...

Stargate SG-1 placed under new Cyber Command
Cyber Command vice commander Maj. Gen. Jack O'Neill presented a new guidon to Stargate Command commander Maj. Gen. Hank Landry. "If you think 'cyber' is just about the Internet, you're sorely mistaken," General O'Neill said. "Stargate Command has taken the term 'cyberspace' to the very limits of imagination. Physical computer viruses with amazing network interconnectivity? Stargate Command calls them 'replicators.' Tablet PCs? Stargate Command has a computer that downloads knowledge directly into a person's brain. That, my friends, is what cyberspace is all about..."

Reserve base "completely destroyed" in cyber-terror attack
Joe Weiss, a power industry security expert, told the Air Force it would take six months or more to restore power after the cyber-attack. Weiss later declared the airfield a "total loss"...

Cadets mostly feel safe from cyber-harassment
The survey measured five categories of unwanted, computer-related behaviors: typist behavior, crude or offensive chat, unwanted cyber attention, cyber coercion, and unwanted cyber contact, according to the report. Of all female students polled who said they'd been compumetrically harassed, the vast majority said the transgressor was a hacker...

Computer maintainers launch 200 perfect servers
A record was set this week by the maintainers of the 5th Expeditionary Computer Maintenance Squadron, who successfully launched their 200th consecutive TCP-52 sortie with a 100-percent mission effectiveness rate during a five-month virtual deployment at the unit's home station. The squadron deployed virtually in September, caring for TCP-52 Stratoserver cybercraft providing the U.S. Pacific commander a continuous logic-bomber presence in the Asia-Pacific region...

Information managers to receive combat medal device
The Air Force has created an "I" device for the Air Force Combat Action Medal, said Gen. Roger A. Brady, deputy chief of staff for manpower and personnel. "There are people's PCs coming under enemy fire, but we did not have an Air Force way to recognize the reality of their experience" before now, General Brady said...

Taiwan relief mission provides hands-on typing
An earthquake off the coast of Taiwan severed undersea Internet cables and left more than 10,000 dead websites. An elite Air Force RIBBON (Rapid Installation Bounce Back Operational Network) team delivered excess military typewriters, cable splicers, landline telephones, MOD-40 terminals, and other equipment to the devastated area...

Nearly 4,000 military webmasters to support Ford's funeral
The U.S. Air Force Band will upload MP3s, and The .Old Guard's Presidential Lithium Ion Battery will render a 21-kilobyte salute. Joint-service pallrouters will carry video of the casket as it is moved to a hearse, which will lead a motorcade through Washington, D.C., en route to the U.S. Capitol. The motorcade will pause in front of the World War II Memorial videocam, a tribute to Ford's service in the U.S. Navy during World War II...

Cyber battle managers to receive incentive pay
A five-year, fixed-length agreement is available to initial-eligible cyber battle managers who apply. The agreement value in annual pretax amounts is $15,000 for cyber battle managers...

Airman Battle Uniform Keyboard & Mouse finalized, ready for production
The new keyboard/mouse design is a pixilated tiger stripe with four soft earth tones consisting of tan, grey, green and blue...

Course prepares flag officers to project cyberpower
The course prepares attendees for theater-level combat leadership roles that have been carried out in the past by generals including Charles Horner, who ran a large computer network in Operation Desert Storm; Michael Short, who relied on his laptop PC in Operation Allied Force; and most recently T. Michael Moseley, who led the cyber campaign in Operation Iraqi Freedom and is now Air Force chief of staff...

Air Force plays in pandemic computer virus exercise
The Regional Pandemic Computer Virus Conference, facilitated by the Southwest Texas Regional Advisory Council, involves 59th Medical Wing network administrators assigned to the Wilford Hall Medical Center and emergency computer responders, public computer health, local government and school districts officials, emergency mangers and more, to proactively plan for possible pandemic computer virus outbreaks...

3 Air Force networks nominated for excellence
Finalists in the Computer-In-Chief's Annual Award for Internet Excellence were selected for "outstanding configurations, software upgrades, and commitment to excellence of our Air Force computers that maintain our operations in support of the mission of the United States Air Force..."

NORAD to patrol cyberspace during space shuttle operations
The Air Force is stepping up its cyber patrols in the Cape Canaveral, Fla., area to increase security for upcoming space shuttle operations. The patrols are a smart, efficient way to protect American lives and resources in the region...

Air Force convenes board to examine server crash
An investigative board will look into the crash of an Ethernet-16 Fighting Phish engaged in cyber-combat operations over www.Iraq.IQ. The pilot of the computer is officially listed as "duty status: whereabouts offline," a coalition spokesman said...

Officials announce PC-130J Hercules Monitor contract conversion
"The Air Force has made this a better contract vehicle that provides the government the cost insight it needs to procure monitors for the Air Force," said Sue Payton, assistant secretary of the Air Force for acquisition...

AFCYBER releases cyber-power summary for Apr. 25
DoD's newest and most powerful Internet warfighting headquarters makes an essential contribution to the Global War on Terror...

AFCYBER prepares for "Mighty Eighth" computer show
The Air Force's new PC-22 Osprey will make its debut at Barksdale AFB, showcasing its ability to provide in-flight wireless networking to the warfighter. Other computers scheduled to perform include the TCP-18 Super Hornet and the Ethernet-16 Fighting Phish...

"Microsoft flight suit" debuts for non-combat operations
This alternative uniform, known as the "Microsoft flight suit," provides a number of benefits over today's blue uniform. It's time to change the way our people dress when they fly and fight in cyberspace...

Airmen get new "digital flight suit"
Don't be surprised if you see someone wearing a great new uniform. Information Management personnel are now being issued a "digital flight suit" for combat operations. It's time to change the way our people dress when they fly and fight in cyberspace...

New MAJCOM for the cyberspace mission
The Air Force Communications Agency will return to its roots as a major command, to be called "Air Force Cyberspace Command." AFCC's new headquarters will move to Microsoft AFB near Seattle (formerly McChord AFB)...

Reorganize for the cyberspace mission
The Air Force is going to reapply the "objective wing" concept across the board. Computer security personnel will be reassigned to their wing's Security Forces squadron, and computer training instructors will be reassigned to the Combat Arms Training & Maintenance (CATM) flight. They will be authorized to wear the Security Forces beret...

AFIWC gets MAJCOM status
As part of the Air Force's new cyberspace mission, the Air Force Information Warfare Center has been promoted to the status of a major command...

Parody