Category: University of Alaska Fairbanks

Final Dispatch from the RV Sikuliaq – Cybersecurity in the Wild

The SECURE-IT cyber training cruise aboard the R/V Sikuliaq has come to an end, and I’m writing this final post while taking in the cold Alaskan air after days of navigating the Pacific. It’s hard to put into words how transformative this experience has been, both technically and personally.

Each day onboard was a full-immersion dive into maritime cybersecurity and cyberinfrastructure. We configured segmented networks using Fortinet firewalls, utilized Proxmox virtual environments, and worked with legacy systems still commonly found in real-world maritime operations. We tackled bandwidth limitations, satellite communications, and network segmentation in a way that mirrored actual at-sea constraints—and that’s not something you can fully simulate in a classroom.

One of the most impactful parts of this experience was the people. Having such a diverse crew—ranging from seasoned technologists and marine technicians to undergraduate students from across the country—created an environment rich in what’s known as tacit knowledge. These are the kinds of insights that aren’t always written down—techniques, workarounds, and instincts that come from time spent in the field. Watching the experienced professionals troubleshoot or explain their setups gave me a much deeper appreciation for the human element in technical problem-solving.

Another standout for me was having Tyler Peterson, a former MATE intern, onboard. His background as a marine technician and his experience with more traditional MATE internships helped bridge the gap between the classic marine tech path and this first-of-its-kind cruise focused on Information Technology, cybersecurity, and cyberinfrastructure. While we weren’t supporting an active science mission during this cruise, Tyler helped connect the dots between shipboard IT systems and how they ultimately enable and support scientific research. That context was incredibly valuable—it made the purpose behind the tech we were building feel real and relevant.

Something else that really stuck with me: it takes a variety of disciplines to make scientific research at sea possible. From satellite communications and data acquisition systems to physical deployments like the ARGO floats, the cruise was a reminder that meaningful science only happens when engineers, IT professionals, technicians, and scientists work in harmony. This cruise wasn’t just a training exercise—it was a snapshot of what that collaboration can look like in action.

One of the personal highlights: I earned three cybersecurity certifications during this cruise—two from Fortinet and one awarded by the R/V Sikuliaq team. These credentials not only boosted my technical skill set, but also marked a real milestone in my journey toward becoming a cybersecurity professional in the maritime world.

Massive thanks to the University of Alaska Fairbanks (UAF) for hosting, Fortinet for the technical resources, the MATE program for making this internship possible, the crew of the R/V Sikuliaq, and everyone who made this adventure happen. Special shoutout to Julian Race for leading the charge and creating space for real hands-on learning. I’m leaving this cruise sharper, more inspired, and more confident in my future as a cybersecurity professional in the maritime space.

Until next time—signing off from the Gulf of Alaska.

Cybersecurity at Sea – Aboard the R/V Sikuliaq

Hello! I’m currently writing from my newly designated workstation aboard the R/V Sikuliaq, docked at the University of Hawaiʻi Marine Center in Honolulu, Hawaiʻi. We are scheduled to get underway later this evening. The Sikuliaq, operated by the University of Alaska Fairbanks, is a 261-foot ice-capable research vessel, and our current expedition—SEACURE-IT—is focused on advancing cybersecurity practices in maritime environments.

Our mission centers on understanding and strengthening shipboard cybersecurity infrastructure. Today’s focus was building a simulated research vessel network using Fortinet hardware, including a FortiGate next-generation firewall and a FortiSwitch managed switch. Each virtual vessel was named after a Star Trek captain, and I’m pleased to report that the R/V Christopher Pike is now fully operational.

To bring the system online, we began by installing the firewall and switch hardware, gaining access through the serial console port. From there, we configured a VLAN (Virtual Local Area Network) and assigned appropriate switch ports. After establishing basic connectivity, we implemented firewall rules to enable WAN access for the VLAN while maintaining strict segmentation between networks.

One of the critical lessons in maritime cybersecurity is the need to separate Information Technology (IT) systems from Operational Technology (OT). Onboard vessels, OT systems (such as industrial controllers managing propulsion, navigation, and critical mechanical systems) are sometimes based on legacy architectures and lack modern security hardening. Allowing these to share a network with IT systems—or worse, exposing them to the internet—creates serious vulnerabilities. Our firewall policy design reflects this reality, ensuring the IT and OT VLANs remain isolated. It is also best practice to separate these networks so that everyday users do not accidentally interfere with critical operations.

After confirming secure internet access on the IT VLAN, we deployed a lightweight Ubuntu virtual machine using the Proxmox hypervisor. While running on limited hardware, the system performs well thanks to the efficiency of Ubuntu, enabling us to simulate key cybersecurity operations within our constrained environment.

To put our network control to the test, I implemented a multi-layered blocking policy targeting a known security concern: TikTok. Using FortiGate’s Application Control, DNS Filtering, and Web Filtering capabilities, I successfully restricted access to TikTok domains and traffic patterns. As a result, no devices on our network can currently access the platform—a practical example of layered defense and policy enforcement in a live environment.

This experience has already been invaluable. I’m gaining exposure not only to enterprise-grade network security tools, but also to the nuances of securing mission-critical systems aboard research vessels.

Introduction – RaymondJames

Hello, I’m RaymondJames Gallant, a cybersecurity student at Eastern New Mexico University and a 2025 MATE intern. I’ll soon be embarking on a cyber internship aboard the RV Sikuliaq, where I’ll be learning firsthand how cybersecurity supports maritime research and operations. I’m passionate about protecting critical infrastructure and excited to explore the intersection of technology and ocean science. I’ll be using this blog to document my experiences, growth, and reflections throughout the journey—thanks for following along!

Powered by WordPress & Theme by Anders Norén