Hello sailors and scallywags! My name is Micah Barton. I am a recent graduate of Cape Fear Community College, with an associates degree in Marine Technology. The privilege of a high quality education has forever changed my life for the better, and I have developed a deep love and passion for marine sciences. Every moment has been wonderful, from surveying in the rain, watching sharks circle the trawl, troubleshooting software for hours, and even to counting thousands of shrimp- fantastic. I can’t imagine my life without it. I have an amazing crew of educators and classmates that have worked tirelessly and pushed me to make it this far; I work hard every day to make them proud!
This is a picture of my last cruise at CFCC aboard the R/V Cape Hatteras. Since day one of sailing, I knew that there was no going back for me- life at sea or bust! Like countless others before me, I have felt the breeze on my cheek and heard the voice of the sea;
Voice of the sea that calls to me, Heart of the woods my own heart loves, I am part of your mystery— Moved by the soul your own soul moves.
Dream of the stars in the night-sea’s dome, Somewhere in your infinite space After the years I will come home, Back to your halls to claim my place.
by William Stanley Braithwaite
Here I am! I love to fish, explore, and create. I will be starting my internship on the R/V Thomas G. Thompson. Through this blog I hope to share my journey, my perspectives, and the things I learn along the way. Thank you for joining me, and I can’t wait to see what the future holds!
The SECURE-IT cyber training cruise aboard the R/V Sikuliaq has come to an end, and I’m writing this final post while taking in the cold Alaskan air after days of navigating the Pacific. It’s hard to put into words how transformative this experience has been, both technically and personally.
Each day onboard was a full-immersion dive into maritime cybersecurity and cyberinfrastructure. We configured segmented networks using Fortinet firewalls, utilized Proxmox virtual environments, and worked with legacy systems still commonly found in real-world maritime operations. We tackled bandwidth limitations, satellite communications, and network segmentation in a way that mirrored actual at-sea constraints—and that’s not something you can fully simulate in a classroom.
One of the most impactful parts of this experience was the people. Having such a diverse crew—ranging from seasoned technologists and marine technicians to undergraduate students from across the country—created an environment rich in what’s known as tacit knowledge. These are the kinds of insights that aren’t always written down—techniques, workarounds, and instincts that come from time spent in the field. Watching the experienced professionals troubleshoot or explain their setups gave me a much deeper appreciation for the human element in technical problem-solving.
Another standout for me was having Tyler Peterson, a former MATE intern, onboard. His background as a marine technician and his experience with more traditional MATE internships helped bridge the gap between the classic marine tech path and this first-of-its-kind cruise focused on Information Technology, cybersecurity, and cyberinfrastructure. While we weren’t supporting an active science mission during this cruise, Tyler helped connect the dots between shipboard IT systems and how they ultimately enable and support scientific research. That context was incredibly valuable—it made the purpose behind the tech we were building feel real and relevant.
Something else that really stuck with me: it takes a variety of disciplines to make scientific research at sea possible. From satellite communications and data acquisition systems to physical deployments like the ARGO floats, the cruise was a reminder that meaningful science only happens when engineers, IT professionals, technicians, and scientists work in harmony. This cruise wasn’t just a training exercise—it was a snapshot of what that collaboration can look like in action.
One of the personal highlights: I earned three cybersecurity certifications during this cruise—two from Fortinet and one awarded by the R/V Sikuliaq team. These credentials not only boosted my technical skill set, but also marked a real milestone in my journey toward becoming a cybersecurity professional in the maritime world.
Massive thanks to the University of Alaska Fairbanks (UAF) for hosting, Fortinet for the technical resources, the MATE program for making this internship possible, the crew of the R/V Sikuliaq, and everyone who made this adventure happen. Special shoutout to Julian Race for leading the charge and creating space for real hands-on learning. I’m leaving this cruise sharper, more inspired, and more confident in my future as a cybersecurity professional in the maritime space.
Until next time—signing off from the Gulf of Alaska.
Hello! I’m currently writing from my newly designated workstation aboard the R/V Sikuliaq, docked at the University of Hawaiʻi Marine Center in Honolulu, Hawaiʻi. We are scheduled to get underway later this evening. The Sikuliaq, operated by the University of Alaska Fairbanks, is a 261-foot ice-capable research vessel, and our current expedition—SEACURE-IT—is focused on advancing cybersecurity practices in maritime environments.
Our mission centers on understanding and strengthening shipboard cybersecurity infrastructure. Today’s focus was building a simulated research vessel network using Fortinet hardware, including a FortiGate next-generation firewall and a FortiSwitch managed switch. Each virtual vessel was named after a Star Trek captain, and I’m pleased to report that the R/V Christopher Pike is now fully operational.
To bring the system online, we began by installing the firewall and switch hardware, gaining access through the serial console port. From there, we configured a VLAN (Virtual Local Area Network) and assigned appropriate switch ports. After establishing basic connectivity, we implemented firewall rules to enable WAN access for the VLAN while maintaining strict segmentation between networks.
One of the critical lessons in maritime cybersecurity is the need to separate Information Technology (IT) systems from Operational Technology (OT). Onboard vessels, OT systems (such as industrial controllers managing propulsion, navigation, and critical mechanical systems) are sometimes based on legacy architectures and lack modern security hardening. Allowing these to share a network with IT systems—or worse, exposing them to the internet—creates serious vulnerabilities. Our firewall policy design reflects this reality, ensuring the IT and OT VLANs remain isolated. It is also best practice to separate these networks so that everyday users do not accidentally interfere with critical operations.
After confirming secure internet access on the IT VLAN, we deployed a lightweight Ubuntu virtual machine using the Proxmox hypervisor. While running on limited hardware, the system performs well thanks to the efficiency of Ubuntu, enabling us to simulate key cybersecurity operations within our constrained environment.
To put our network control to the test, I implemented a multi-layered blocking policy targeting a known security concern: TikTok. Using FortiGate’s Application Control, DNS Filtering, and Web Filtering capabilities, I successfully restricted access to TikTok domains and traffic patterns. As a result, no devices on our network can currently access the platform—a practical example of layered defense and policy enforcement in a live environment.
This experience has already been invaluable. I’m gaining exposure not only to enterprise-grade network security tools, but also to the nuances of securing mission-critical systems aboard research vessels.