Cadet Dan Jeffers calmly tracked the action on his computer screen, wondering about the enemy's next move.
"I'm sure they're just surfing around, looking for something right now," said Jeffers, examining long gray lines of scrolling script.
The Cyber Defense Exercise conducted this week among the nation's service academies is a new kind of drill to prepare a new kind of military. The flanking maneuver Jeffers worried about didn't come from a tank column. It stemmed from hackers ramming his computer defenses.
"The battle may be raging, but it's happening in cyber-pace," said Lt. Col. Daniel Ragsdale of the U.S. Military Academy here.
The third annual drill, which ran Monday through Thursday, included computer specialists from the three major military academies as well as institutions like the U.S. Coast Guard Academy.
At West Point, a "blue team" of a few dozen cadets in a camouflage-draped computer lab faced off against a "red team" of hackers from the National Security Agency, the federal intelligence agency that specializes in electronic intelligence gathering and cryptography.
Red team's basic mission was to bore through each academy's Internet firewall and probe for weaknesses that could give them access to secure data.
The exercise fits in the military's recent emphasis on "network-centric warfare" -- linking commanders, soldiers, weapons and intelligence into an overarching computer grid. Such real-time battlefield information is supposed to cut through the confusion that leads to the oft-cited "fog of war."
Gone are the days when soldiers took pride in their lack of technological expertise, said Ragsdale, who directs West Point's Information and Technology Operations Center.
"Somehow, you were more of a soldier if you were a technophobe," Ragsdale said. "You know, 'Give me a grease pencil and a piece of acetate, and I'll give you a battle plan."'
These days, cyber-attacks -- and defense -- are an important part of the Pentagon's arsenal.
"We're doing network attacks, we are hacking into e-mail systems of adversaries," said Dan Goure of the Lexington Institute, a military think tank. Goure noted reports of U.S. intelligence operatives e-mailing Iraqi generals during the war.
Modern information warfare involves not just attempts to disable enemy networks with cyber-attacks but also to penetrate them and plant bogus information.
The Pentagon is thus going to lengths to protect its own systems, relying on tools ranging from encryption to special programs that hunt for computer worms, Goure said.
At West Point four years ago, Ragsdale said there was no talk about "information assurance" warfare. Today, data security is key to the cyber-exercise, which has grown in scope since it began in 2001.
On day two of this year's exercise the cyber-attacks continued all day -- literally hundreds of thousands in the form of "malicious packets."
"They'll try everything they have. They'll unload their arsenal on us," said Maj. Scott Lathrop, the academy's information warfare instructor.
The academy that musters the best defenses gets a trophy from the NSA. West Point has won the last two years. While cadets weren't hanging up "Beat Navy Hackers" banners, the interacademy rivalry is intense.
A number of Army cadets stayed up into the wee hours after Monday's initial attacks to refortify their LAN. Cadets ate sandwiches at their terminals as one companion rested his head on a table.
Cadet Shaun Baker of Houston said the intense pace was worth it, even if it sapped him for physical training later on.
"We have a PT test tomorrow that I have to get some sleep for," he said. "That's not happening."
Copyright 2003. Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.