Cyberwarriors guard virtual front

FARWANIYA, Kuwait — As coalition forces continue to engage the enemy throughout Iraq, the number of battles being fought in cyberspace also has risen, according to one Army information assurance officer.

Col. Mark Spillers, information assurance program manager in the Coalition Forces Land Component Command communications office at Camp Doha, Kuwait, said there has been a slight increase in cyberattacks against coalition systems since Operation Iraqi Freedom began, "but all along there have been pretty active attempts."

"These could be casual [probes], and sometimes we don't know if it's hackers trying to come in or simple scans," Spillers said during a March 29 phone interview. If a device is thought to be compromised, it is immediately isolated, taken off the network and scanned for viruses, but "we've done well to prevent that from becoming a problem."

Spillers, a reservist with the 335th Signal Command in Atlanta, has been in Kuwait for about two months. He said he could not go into any details about how the Army is protecting its systems or if any have been compromised, but he noted, "We're holding our own."

"With anything with cyberwarfare, the enemy is all around and we're constantly working to stay one step ahead of them," he said. "Sensors are constantly monitoring for scans or intrusion attempts against us."

On the physical battlefield, if troops are in danger of being defeated, procedures are in place to safeguard or even destroy endangered equipment and systems to keep sensitive data from falling into enemy hands.

For example, machines linked to the Defense Department's Secret Internet Protocol Router Network have removable hard drives, Spillers said, adding that similar protections exist for cryptographic tools in the field.

In addition to blocking electronic hacking and physical attempts to overrun their systems, the Army also must protect its information technology equipment from another constant nuisance: sand. When equipment is moved, it is kept covered, and cans of compressed air are constantly used to blow sand and dust out of keyboards and other devices. Back at the camps, most servers, routers and PCs are kept in environmentally controlled facilities, Spillers said, adding that excessive heat is also a growing concern.

"In general, we've had several years' experience with this going back to the Gulf War, and we've done a good job keeping [problems caused by] environmental conditions to a minimum," he said.

If a machine does break down, he said the service follows fix-and-replace procedures specific to the equipment. A help desk is set up at Camp Doha to deal with IT issues, and he said the Army has a "very decentralized network support structure" so forward-deployed computer users can get their questions answered and problems fixed at a local level.


  • Congress
    U.S. Capitol (Photo by M DOGAN / Shutterstock)

    Funding bill clears Congress, heads for president's desk

    The $1.3 trillion spending package passed the House of Representatives on March 22 and the Senate in the early hours of March 23. President Trump is expected to sign the bill, securing government funding for the remainder of fiscal year 2018.

  • 2018 Fed 100

    The 2018 Federal 100

    This year's Fed 100 winners show just how much committed and talented individuals can accomplish in federal IT. Read their profiles to learn more!

  • Census
    How tech can save money for 2020 census

    Trump campaign taps census question as a fund-raising tool

    A fundraising email for the Trump-Pence reelection campaign is trying to get supporters behind a controversial change to the census -- asking respondents whether or not they are U.S. citizens.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.