BY ORDER OF THE COMMANDER
AIR COMBAT COMMAND
AIR COMBAT COMMAND MANUAL
17-2CVA/H, VOLUME 3
19 JANUARY 2021
Cyberspace
CYBER VULNERABILITY
ASSESSMENT/HUNTER (CVA/H) -
OPERATIONS AND PROCEDURES
COMPLIANCE WITH THIS PUBLICATION IS MANDATORY
ACCESSIBILITY: Publications and forms are available for downloading on the e-Publishing
website at www.e-publishing.af.mil.
RELEASABILITY: There are no releasability restrictions on this publication.
OPR: USAF/ACC/A3/2/6K
Certified by: USAF/ACC/A3/2/6K
(Col Eric C. Paulson)
Pages: 28
This manual implements Department of the Air Force Policy Document (DAFPD) 17-2, Cyber
Warfare Operations, and Air Combat Command Instruction (ACCI) 17-202, Volume 3,
Cybercrew Operations and Procedures. This manual establishes the minimum Air Force (AF)
standards for operating and performing cybercrew duties on the Cyberspace Vulnerability
Assessment/Hunter (CVA/H) weapon system. This publication applies to all Air Combat
Command (ACC), Air Force Reserve Command (AFRC), Air National Guard, and third-party
governmental and contract support agencies in accordance with (IAW) appropriate provisions
contained in memoranda, support agreements and AF contracts. This publication requires the
collection and or maintenance of information protected by the Privacy Act of 1974, as amended,
authorized by Air Force Instruction (AFI) 36-2608, Military Personnel Records System. Ensure
that all records and processes prescribed in this publication are maintained IAW AFI 33-322,
Records Management and Information Governance Program, and are disposed IAW the Air Force
Records Disposition Schedule (RDS), located in the Air Force Records Information Management
System (AFRIMS). System of Records Notice F011 AF AFMC B, Patriot Excalibur (PEX) System
Records, applies and is available at https://dpcld.defense.gov/Privacy/SORNsIndex/DOD-
Component-Notices/Air-Force-Article-List/. Vigilance must be taken to protect Personally
Identifiable Information when submitting or sending nominations, applications or other documents
to Department of Defense (DoD) agencies through government Internet, software applications,
systems, e-mail, postal, faxing or scanning. Refer to the following directives for additional
guidance: AFI 33-332, Air Force Privacy and Civil Liberties Program, DoD 5400.11-R,
Department of Defense Privacy Program. Forms containing Personally Identifiable Information